Volume 10 Issue 1

Published: 2025-06-25

Contents


Research Paper
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data

Naglaa Badi Ibrahim, Hana Muhammad Usman,

The increasing of security attacks and unauthorized intrusion have made network security one of the main subjects that should be considered in present data communication environment. Intrusion...

Pages: 251-261
Using Kernel Estimator and K-Mean Clustering Approach to Hand Gesture Recognition

Ban A. Mitras, AAlA Mahmood Mohammed,

In this paper we used non parametric density estimator (Kernel Estimator) to estimate probability density function for Image data of Hand Gesture and warping Hand Gesture and we see the curve for...

Pages: 137-145
Distributed Databases: ERP System as a Case Study Model in the Factory of Fabric and Weave in Mosul

Akram Ahmed Al-Tawil, Bilal Tawfiq Younis,

The Research aim to implementation Distributed Database approach through ERP system that new application for information Technology Owing to the Scarcity of the Arabic studies tackling ERP System...

Pages: 25-46
Cuneiform Symbols Recognition Based on K-Means and Neural Network

Naktal M. Edan,

Cuneiform is the ancient writing systemin the world. But, there is no clear interest recognition cuneiform symbol, despite its importance. This research interested in building an algorithm for...

Pages: 195-202
Using Random Scrambling in Multi Media Encoding

Ghada Mohammad Tahir Qasim,

The research deals with implementation of a new algorithm to encrypt multimedia files this method called random scrambling, to increase the security of the transmitted files, a secret key is used...

Pages: 209-225
Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks

Jamal Salah Al-Din Sayed Majeed, Isra Zuhair Majeed Qabaa,

Estimation models in software engineering are used to predict some important and future features for software project such as effort estimation for developing software projects. Failures of...

Pages: 351-364
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System

Najla B. Ibraheem, Muna M. T. Jawhar, Hana M. Osman,

Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion...

Pages: 127-135
Encrypted and Hiding Information in Digital Images using Wavelet Transformation and LSB Technology

Ahmed Hamed Saleh Al-Badrani,

Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle of the cover image to a person without knowing any...

Pages: 75-84
Dimensionality Reduction using Hybrid Algorithms and Their Application to Remote Sensing Data

Maha Abdul Rahman Hasso, Mona Jaafar Siddiq,

In this work, A proposed Algorithm has been constructed for the selecting the best band and lessening high dimension of remote sensing data depending on multi algorithms, each on carried out and...

Pages: 333-349
Digital Image Watermarking Scheme Using Discrete Wavelet Transform Domain, Quantization, and Genetic Algorithm

Nasseer Basheer, Shaymaa S Abdulsalam,

Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. Watermarking is identified as a major means to achieve copyright...

Pages: 13-27
Design a Tool for Generating Test Cases using Swarm Intelligence

Shahbaa I. Khaleel, Ashraf Abdulmunim Al Thanoon,

In this research, the tools and techniques of artificial intelligence were studied and employed in software engineering. And that was conducted through using the Particle Swarm Optimization PSO and...

Pages: 421-444
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices

Omar A. Ibrahim, Omar A. AL-Saffar,

Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use,...

Pages: 119-126
Direct Transmission of Products Designs in Distributed Manufacturing

Ammar Thaher Yaseen,

Information and Communication Technique show an efficient technical capabilities for management and controlling the distributed operations among various factories. For this, the industrial...

Pages: 297-307
Three Proposed Hybrid Genetic Algorithms

Nada F. Hassan, Ban A. Mitras,

Genetic Algorithm has been hybridized with classical optimization methods. Hybridization has been done in three approaches, by using conjugate gradient algorithm for Fletcher and Reeves, second by...

Pages: 53-64
Parallel Programming for Solving Linear BVP’s by Linear Superposition using CS_Tools

Bashir Khalaf, Firas Saeed,

The objective of this paper is to speed the solution of linear Boundary Value Problem (LPVPs) by parallel Programming by using cs_tools where the solution methods is the linear superposition...

Pages: 29-42
An Analytical Mathematical Study of Artificial Neural Network Algorithms in the Suitability of a Model for Medical Diagnosis

Omar Saber Qasim, Israa Rustum Mohammed,

In this research discuss the concept of appropriate form, by examining mathematical behavior for three models represent neural networks are (GRNN, BPNN, PNN), were applied two types of medical data...

Pages: 183-194
An Algorithm for Smoker Detection

Hiba Adreese Youni, Saleem Omar, Mafaz Abd Alwahhab, Enas Mqdad,

In this research an algorithm was suggested for studying speech signal properties for both smokers and non smokers then verificate that the person smoker or not based on his speech signal. A data...

Pages: 61-74
Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data

Alaa Jumaa, Sufyan T. F. Al-Janabi, Nazar A. Ali,

Data mining is the process of extracting hidden patterns from data. One of the most important activities in data mining is the association rule mining and the new head for data mining research area...

Pages: 91-105
Development of Traditional Algorithm Used in Denoising to Enhance Contrast of the Color Images

Hanan Ali, Esraa Abd Al-Majed, Asmaa Nadhim, Rahma Saleem,

With the evolution of life and complexity there is a need to use the images in many scientific fields weather forecast, medical, engineering, and the fact that these images are a lot of distortion...

Pages: 227-238
Suggested Method for Audio File Steganography

Saja J. Mohammed, Faris E. Mohammed,

The world is tend now a lot of development in communication field specially in internet , therefore it is very important to find security methods for files that is send from one place to another....

Pages: 285-295
Improved LSB Method using Standard Deviation Scale

Nadia M. Mohammed, Riyam J. Essa, Amina M. Najim,

The concealment of the most important means used by the security institutions with critical communications in all countries of the world, they provided the technology of high security, especially...

Pages: 195-208
Using Artificial Intelligence Techniques For Intrusion Detection System

Manar Y. Ahmed, Bayda I. Khaleel,

Along with the development and growth of the internet network, and the rapid expansion of World Wide Web and local network systems have changed the computing world in the last decade. Nowadays, as...

Pages: 157-175
Electronic Forecasting of Women's Jumping Events using Neural Networks

Fares Ghanem Ahmed, Aida Younis Muhammad, Hala Nafi Fathi,

The aim of this research is to use neural network in future forecasting field to show the of jumping competitions in international Olympics for (2016-2024). Expert system named (AAA) is designed by...

Pages: 309-321
Building a System to People Identification Based on Human Hand Geometry

Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb,

This paper present a new practical authentication system which is depend on one of the biometrics features Hand Geometry features. the proposed system Captures human hand image to extract 50...

Pages: 47-60
Building a Software System Using a Spiral Model to Evaluate the Overall Risk of Projects Using Fuzzy Number Theory

Jamal Salah Al-Din Sayed Majeed, Ro’a Amer Hussain,

This research aims presented a practical application for the process of assessing the overall risk of the projects following the risk management in software engineering steps, the life cycle is the...

Pages: 365-384
Building a Multi-Period Probability Dynamic Inventory Model with Application

Ahmed Mahmoodi Al-Sebaw, Noor Abdul Aziz Hussein,

In this paper addresses the multi-period single-item inventory problem with stochastic demands. In which the demand in each period is known but it varies from time to time for N replenishment...

Pages: 85-101
Identification of Some Variables Affecting the Granting of The Fundamentals of Computer and Internet Certificate (IC3)

Marwan A. Dabdoub, Ahmed M. Esmaeel,

To identify certain variable that influence the result Internet and Computing Core Certification examination (IC3) which is conducted in the ComputerCenter and Internet at the University of Mosul....

Pages: 113-125
The Discrimination of Red Blood Cells Infected by Hereditary Hemolytic Anemia

Ghayda A.A. Al-Talib, Hesham H. Mohameed,

This paper presents a medical application based on digital image processing and Artificial Neural Network (ANN), which can recognize three types of Hereditary Hemolytic Anemia (HHA) that affect the...

Pages: 65-78
Use the Frequency Domain to Hide in Some Audio Files

Zahraa Tarik, Farah T. Mohammd, Ikhlass Thanoon, Azhar Rafie,

In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is...

Pages: 275-284
Existing Object Oriented Design Metrics a Study and Comparison

Laheeb M. Al-Zobaidy, Khalil A. Ibrahim,

Software Quality still a vague and multifaceted concept, which means different things to different people, metrics for object oriented design focuses on measurements that are applied to the class...

Pages: 137-147
Design and Implementation of OLAP System for Distributed Data Warehouse

Murtadha M. Hamad, Abdullah F. Mahdi,

Data warehousing and on-line analytical processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. A distributed OLAP system is...

Pages: 149-155
Reconcile an Appropriate Model for the Occurrence of Periods of Infection with Hepatitis C in the Province of Nineveh - A comparative Study with the Geometric Process Model -

Muthanna Subhi Sulaiman, Shaimaa Waleed Mahmood,

In this study we are build a model for the intervals of occurrence of viral hepatitis type C in Nineveh province by using of time-series analysis, and compared with the Geometric process model, and...

Pages: 103-112
Building a Search Engine for the Personal Computer and the Local Network

Fares Adel Dawood, Khaled Hussein, Mohamed Majed,

Computer users need to advanced methods for accessing stored information with at high speed and accurate information retrieval of from among the millions of files stored on a personal computer when...

Pages: 409-420
Use the Genetic Algorithm to Encode and Hide Gray Image Data

Raya Jassim Essa, Reham Jassim Essa, Inam Muhammad Sulaiman,

With the development of means of communication, computer science and information exchange via electronic information networks an urgent need emerged to find ways to save exchanged information....

Pages: 169-182
Hybrid System for Speech Coding Based on Contourlet Transformation

Khalil I. Alsaif, Hadia S. Albadrani,

The main objective of speech coding is to allow the transmission of speech over digital channel of the highest speech quality and least possible bit rate, beside the security purpose. In this...

Pages: 107-117
Modeling and Analyzing Virtual Links Links Between the Sites of the Centers of the University of Mosul

Basil Younis Al-Khayat, Talal Fadel Hussein,

This paper deals with PageRanks which are used in the analysis of web links. It displays an introduction for the concept PageRanks and also some basic theoretical aspects related to it. It...

Pages: 157-167
Suggest a Reverse Engineering Tool to Analyze the Software Source Code Written in Java

Alaa Yassin Taqah, Tawfiq Miqdad Tawfiq,

Reverse engineering has presented solution to a major problem in the development and maintenance of the legacy software which is the process of understanding these software types, It is a difficult...

Pages: 385-407
Botne and Botnet Detection Survey

Manar Y. Ahmad, Maisireem A. Kamal,

Among the various forms of malware, Botnets are emerging as the most serious threat, Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and...

Pages: 79-89
Use of General Regression Artificial Neural Network to Identify the Natural Growth of Head Circumference of the Baby

Susan H. Mohammed, Aesha S. Shaheen, Amera I. Melhum,

Recently, many cases of deformities and health problems that affect the newborn were recorded, because of the known pollutants and radiation. One of these problems is the growth of the child, both...

Pages: 43-52
Adoption of the Co-Occurrence Matrix and Artificial Neural Networks in Fingerprint Recognition

Maysoon Khidr Al-Nuaimi,

This paper presents a new method for fingerprint recognition depending on various sizes of fingerprint images. The proposed algorithm applied on more than 30 fingerprint samples, the results was...

Pages: 127-136
Authentication of Deoxyribo Nucleic Acid (DNA)

Naglaa Badi Ibrahim, Yassin Hikmat Ismail,

random and have the ability to store a large amount of information. DNA sent either in natural form in the test tube (after being processed) or in digital form (a series of nitrogenous bases), in...

Pages: 17-23
Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array

Maha Hasso, Sahla Abdul Ali,

Recently the Wavelet Transform has gained a lot of popularity in the field of signal and image processing, this is due to its capability of providing both time and frequency information...

Pages: 323-331
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems

Dhuha Basheer Abdullah, Amira B. Sallow,

In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the...

Pages: 187-193
State of Art: Semantic Web

Najla B. Ibraheem, Ban Sh. Mustafa,

Semantic Web is an extension to the current web. It will convert the way we use World Wide Web (WWW) by giving the machine the capability to process and infer data in web. It starts as a vision and...

Pages: 177-186
GLM for Image Steganography Technique

Ahmed S. Nori, Noor N. Ahmed, Thana Gh. Ahmed,

An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This...

Pages: 239-249
Hide Compressed Texts in an Audio File

Shahad Abdel-Rahman Hasso,

Steganography art is a technique of hiding data within data, as hiding text message within an image or an audio file or a video file, it is a new method used as a substitute for the known...

Pages: 263-274
The Use of the Artificial Immune Network Algorithm AIN in Distinguishing English Character Pattern

Maha Abd Alellah Mohammad,

The focus of the present research is on the issue of patterns compatibility regarding an English letter through the use of a probable research Algorithm called the Artificial Immune Network (AIN(....

Pages: 147-156