Volume 6 Issue 1

Published: 2025-06-25

Contents


Research Paper
Pulmonary Tuberculosis Diagnosis Using Artificial Neural Networks

Karam Hatim Thanoon, Mohammed Abd-alraheem Hamdi,

This research can detecting the Tuberculosis by using the artificial neural networks, the idea of this research is to design a system that receive the information of patient and give these...

Pages: 103-114
Segmentation of Brain Tumor Images Using Genetic Algorithms

Dhuha Basheer Abdullah, Mohameed Nathem, Manar Y. Kashmola,

In this research, the brain images resulting from computerized tomography (CT) have been used in order to determine the tumor area in the brain. the steps started by preprocessing operation to the...

Pages: 31-45
Personal Identification with Iris Patterns

Mazin R. Khalil, Mahmood S. Majeed, Raid R. Omar,

This research is aimed to design an iris recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the picture of an eye for data acquisition....

Pages: 13-26
Simulation of Real Time 2D DWT Structure

Mohanad L. Ahmad,

This research contains an introduction to the first works in this field, and describes the Discrete Wavelet Transform DWT which is the only kind that can be implemented in the digital computer. The...

Pages: 41-48
Design and Implementation of Computer Network-Based Robotic System Using HTML Language and CGi Scripts

Maan M. Shaker, Mahmood Sh. Majeed, Mahmood F. Abdullah,

A design and implementation of computer network-based robotic system using HTML language and CGI (Common Gateway Interface) scripts is carried out. The network of the implemented system may be...

Pages: 145-152
Design and Implementation of Router Remote Control System Supporting Static Route Summarization

Ali H. Ali,

In order to improve and upgrade the performance of devices used in data communications, such devices are particularly Routers, which are used to link computer networks among themselves, and for...

Pages: 193-208
Design and Analysis of a Sound Generator for wave file format via Parallel Printer Port

Dhuha Basheer Abdullah,

Ports in computers are used mainly for two reasons : Device control & communication. Parallel ports are mainly meant for connecting the printer to the PC. The purpose of this paper is to design...

Pages: 49-61
Using Hebbian Network for Cipher

Amera Istiqlal Badran, Nidal Hussein Al-Asadi

This research contains two parts, in the first part, a ciphering system is built using the classical Hebbian network to protect data against many expected threats during the transfer of the data....

Pages: 91-101
Geometric Analysis of Images for 3D Models Reconstruction

Rou’a H. Ali, Abdulsatter M. Khidhir, Mayyada Gh. Hammoshi,

Determining three-dimensional (x, y, z) to a point exists in the form of three-dimensional images of two-dimensional method is complex and requires high precision to derive the equations that were...

Pages: 125-132
Counter Mode Development for Block Cipher Operations

Ali M. Sagheer,

There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertextusually of 64 bits but sometimes longer. Stream...

Pages: 133-144
Finding the Amount of the Occupation of a Specific Datum in a ‎Database File

Rayan Yousif Alkhayat

This research includes constructing a software system to find the amount of a specific datum occupation in a database file using fractal dimension , Box Counting method was used to calculate the...

Pages: 135-147
Authenticated and Secure End-To-End Communication Channel Using SMS Messages

Abdullah A. Abdullah,

One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular...

Pages: 209-222
Principle Component Selection for Face Recognition Using Neural Network

Ibrahim A. Saleh,

Face Recognition is an emerging field of research with many challenges such as large set of images,. Artificial Neural Network approach is one of the simplest and most efficient method to overcome...

Pages: 179-191
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network

Mohammed Zaki Hasan

Wireless internet access based on Wireless Local Area Network (WLAN), such as a wireless-Fidelity (Wi-Fi), or Bluetooth networks will become popular with the next few years. New services will be...

Pages: 153-160
Building Simple Protection for Wireless-Fidelity Network

Manar Y. Ahmed, Mohammed Z. Hasan,

This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM)....

Pages: 161-168
Detect Flame Fire Using Fractal Geometry in Color Digital Images

Laheeb Mohammad Ibrahim, Khalil I. Alsaif, Hasan M. Alnima,

Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various useful applications such as tracking...

Pages: 61-78
Protection Against Internal Intruding using Host Identifier Authentication

Basil Y. Alkhayaat, Abdulsattar M. khidhir, Omar A. Ibraheem,

Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall....

Pages: 223-236
Hiding in Text using Information Integrity Service

Dujan B. Taha, Ahmed S. Nori, Yaseen H. Ismaiel,

Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information....

Pages: 115-122
A Comparative Study between Traditional Learning and Virtual Learning (Design a Virtual Learning System)

Maisireem A. Al-Sayeg,

Virtual learning is an essential source of growth in scientific in recent years by standing in the basis of many of the virtual learning programs. In this research virtual learning program has been...

Pages: 79-89
Using the Petri Network to Organize Resource Sharing between Two Processors

Firas Mohammad Al-Abadi,

With the development of information technology and the use of its applications as an essential aspect in almost all patterns of life especially in fields of analysis and real time systems, a...

Pages: 123-133
Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals

Laheeb Mohammad Ibrahim, Hanan H. Ali,

Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact that it has a good performance and...

Pages: 47-59
Fingerprint Image Pre- Post Processing Methods for Minutiae Extraction

Fayadh. M. Abed, Adnan Maroof,

A set of reliable techniques is presented in this paper. These techniques include enhancement and minutiae extraction that involve the clarity of the ridge and valley structures of the input...

Pages: 97-110
Face Recognition and Determination in Color Images

Manar Younis Kashmola, Najim Abdallah Altahhan,

The aim of this study is face detection in colored images (single or multiple faces) where an algorithm based on skin color information, in addition to face features like eyes and mouth, are used....

Pages: 13-29
Improving Gene Expression Programming Method

Najla Akram Al-Saati, Nidhal Al-Assady,

In this work the algorithm of Gene Expression Programming (GEP) is investigated thoroughly and the major deficiencies are pointed out. Multiple suggestions for enhancements are introduced in this...

Pages: 81-95
Arabic Character Recognition Using Fractal Dimension

Khalil I. Alsaif, Karam Hatim Thanoon,

In this work the concepts of the pattern recognition was used to recognize printed Arabic characters, and the Fractal geometric dimension method was used. The input for the system is image, with...

Pages: 169-178
Design and Implementation of Stream Cipher Using Neural Network

Siddeq Y. Ameen, Mazin Z. Othman, safwan hasoon, Moyed Abud Al-Razaq

The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable...

Pages: 237-249
Controlled Gene-Accumulation Programming

Najla Akram Al-Saati, Nidhal Al-Assady,

A full description of a new novel method proposed for Automatic Programming is brought forward in this work. Controlled Gene-Accumulation programming is a method that is purely inspired by concepts...

Pages: 63-79
Design of a Hybrid Intelligent System for Transitional Bladder Cell Carcinoma Diagnosis

Nada N. Saleem, Khalid N. Saleem,

Transitional Bladder cell carcinoma is one of the most common cancers of the urinary tract, accounting for approximately 90% of Bladder cancers. In this research a new computer-based system "Design...

Pages: 27-40
Home Automation Management with WLAN (802.11g) and RF Remote Control

Mahmood S. Majeed, Abdulsattar M. Khidhir, Firas A. Yosif,

The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless home automation control use two methods,...

Pages: 111-124