Volume 6 Issue 1
Published: 2025-06-25
Contents
Research Paper
Pulmonary Tuberculosis Diagnosis Using Artificial Neural Networks
Karam Hatim Thanoon, Mohammed Abd-alraheem Hamdi,
This research can detecting the Tuberculosis by using the artificial neural networks, the idea of this research is to design a system that receive the information of patient and give these...
Segmentation of Brain Tumor Images Using Genetic Algorithms
Dhuha Basheer Abdullah, Mohameed Nathem, Manar Y. Kashmola,
In this research, the brain images resulting from computerized tomography (CT) have been used in order to determine the tumor area in the brain. the steps started by preprocessing operation to the...
Personal Identification with Iris Patterns
Mazin R. Khalil, Mahmood S. Majeed, Raid R. Omar,
This research is aimed to design an iris recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the picture of an eye for data acquisition....
Simulation of Real Time 2D DWT Structure
Mohanad L. Ahmad,
This research contains an introduction to the first works in this field, and describes the Discrete Wavelet Transform DWT which is the only kind that can be implemented in the digital computer. The...
Design and Implementation of Computer Network-Based Robotic System Using HTML Language and CGi Scripts
Maan M. Shaker, Mahmood Sh. Majeed, Mahmood F. Abdullah,
A design and implementation of computer network-based robotic system using HTML language and CGI (Common Gateway Interface) scripts is carried out. The network of the implemented system may be...
Design and Implementation of Router Remote Control System Supporting Static Route Summarization
Ali H. Ali,
In order to improve and upgrade the performance of devices used in data communications, such devices are particularly Routers, which are used to link computer networks among themselves, and for...
Design and Analysis of a Sound Generator for wave file format via Parallel Printer Port
Dhuha Basheer Abdullah,
Ports in computers are used mainly for two reasons : Device control & communication. Parallel ports are mainly meant for connecting the printer to the PC. The purpose of this paper is to design...
Using Hebbian Network for Cipher
Amera Istiqlal Badran, Nidal Hussein Al-Asadi
This research contains two parts, in the first part, a ciphering system is built using the classical Hebbian network to protect data against many expected threats during the transfer of the data....
Geometric Analysis of Images for 3D Models Reconstruction
Rou’a H. Ali, Abdulsatter M. Khidhir, Mayyada Gh. Hammoshi,
Determining three-dimensional (x, y, z) to a point exists in the form of three-dimensional images of two-dimensional method is complex and requires high precision to derive the equations that were...
Counter Mode Development for Block Cipher Operations
Ali M. Sagheer,
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertextusually of 64 bits but sometimes longer. Stream...
Finding the Amount of the Occupation of a Specific Datum in a Database File
Rayan Yousif Alkhayat
This research includes constructing a software system to find the amount of a specific datum occupation in a database file using fractal dimension , Box Counting method was used to calculate the...
Authenticated and Secure End-To-End Communication Channel Using SMS Messages
Abdullah A. Abdullah,
One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular...
Principle Component Selection for Face Recognition Using Neural Network
Ibrahim A. Saleh,
Face Recognition is an emerging field of research with many challenges such as large set of images,. Artificial Neural Network approach is one of the simplest and most efficient method to overcome...
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network
Mohammed Zaki Hasan
Wireless internet access based on Wireless Local Area Network (WLAN), such as a wireless-Fidelity (Wi-Fi), or Bluetooth networks will become popular with the next few years. New services will be...
Building Simple Protection for Wireless-Fidelity Network
Manar Y. Ahmed, Mohammed Z. Hasan,
This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM)....
Detect Flame Fire Using Fractal Geometry in Color Digital Images
Laheeb Mohammad Ibrahim, Khalil I. Alsaif, Hasan M. Alnima,
Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various useful applications such as tracking...
Protection Against Internal Intruding using Host Identifier Authentication
Basil Y. Alkhayaat, Abdulsattar M. khidhir, Omar A. Ibraheem,
Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall....
Hiding in Text using Information Integrity Service
Dujan B. Taha, Ahmed S. Nori, Yaseen H. Ismaiel,
Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information....
A Comparative Study between Traditional Learning and Virtual Learning (Design a Virtual Learning System)
Maisireem A. Al-Sayeg,
Virtual learning is an essential source of growth in scientific in recent years by standing in the basis of many of the virtual learning programs. In this research virtual learning program has been...
Using the Petri Network to Organize Resource Sharing between Two Processors
Firas Mohammad Al-Abadi,
With the development of information technology and the use of its applications as an essential aspect in almost all patterns of life especially in fields of analysis and real time systems, a...
Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals
Laheeb Mohammad Ibrahim, Hanan H. Ali,
Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact that it has a good performance and...
Fingerprint Image Pre- Post Processing Methods for Minutiae Extraction
Fayadh. M. Abed, Adnan Maroof,
A set of reliable techniques is presented in this paper. These techniques include enhancement and minutiae extraction that involve the clarity of the ridge and valley structures of the input...
Face Recognition and Determination in Color Images
Manar Younis Kashmola, Najim Abdallah Altahhan,
The aim of this study is face detection in colored images (single or multiple faces) where an algorithm based on skin color information, in addition to face features like eyes and mouth, are used....
Improving Gene Expression Programming Method
Najla Akram Al-Saati, Nidhal Al-Assady,
In this work the algorithm of Gene Expression Programming (GEP) is investigated thoroughly and the major deficiencies are pointed out. Multiple suggestions for enhancements are introduced in this...
Arabic Character Recognition Using Fractal Dimension
Khalil I. Alsaif, Karam Hatim Thanoon,
In this work the concepts of the pattern recognition was used to recognize printed Arabic characters, and the Fractal geometric dimension method was used. The input for the system is image, with...
Design and Implementation of Stream Cipher Using Neural Network
Siddeq Y. Ameen, Mazin Z. Othman, safwan hasoon, Moyed Abud Al-Razaq
The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable...
Controlled Gene-Accumulation Programming
Najla Akram Al-Saati, Nidhal Al-Assady,
A full description of a new novel method proposed for Automatic Programming is brought forward in this work. Controlled Gene-Accumulation programming is a method that is purely inspired by concepts...
Design of a Hybrid Intelligent System for Transitional Bladder Cell Carcinoma Diagnosis
Nada N. Saleem, Khalid N. Saleem,
Transitional Bladder cell carcinoma is one of the most common cancers of the urinary tract, accounting for approximately 90% of Bladder cancers. In this research a new computer-based system "Design...
Home Automation Management with WLAN (802.11g) and RF Remote Control
Mahmood S. Majeed, Abdulsattar M. Khidhir, Firas A. Yosif,
The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless home automation control use two methods,...