Volume 7 Issue 3
Published: 2025-06-25
Contents
Research Paper
General Regression Neural Network Application for Dynamic Data Compression and Decompression
safwan hasoon, Susan Hassan Mohammed
In the last decade have been witnessed a great development in artificial intelligence especially in neural network .This paper have been employed neural networks techniques for data compression and...
Parallel Direct Search Methods
Bashir M. Khalaf, Mohammed W. Al-Neama,
Mostly minimization or maximization of a function is very expensive. Since function evaluation of the objective function requires a considerable time. Hence, our objective in this work is the...
Using Genetic Algorithm to Estimate (RNA) Estimator
Ban Ahmed Mitras, Farah Saad Nashat,
In this paper the genetic algorithm has been used to estimate the parameter which exist in Boltzmann Distribution which controls the structure of the Ribo Nucleic Acid (RNA). Two algorithms have...
Two Approaches for Implementing & Improving Building Automation System (BAS)
Qutaiba I. Ali, Bashar Abdulazez, Nassr Meacer,
Building Automation Systems (BAS) are used to both improve the indoor climate in buildings and to reduce the operational costs. In this paper, two approaches were used to implement a networked BAS....
An Investigation for Steganography using Different Color System
Ahmed S. Nori, Amira B. Sallow, Zahraa M. Taha,
Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In...
Digital Image Watermarking using Singular Value Decomposition
Sura Ramzi Sheriff,
This paper presents a digital image watermarking that applied theory of linear algebra called Singular Value Decomposition (SVD) to digital image watermarking .SVD watermarking scheme, which...
Building a Spatial Database by Developing a Work Environment to Accomplish the Automatic Transfer Process for Remote Sensing Data from Raster to Linear
Diaa Hazem Al-Berhawi,
In this paper a develop an working environment for building spatial database by utilizing ArcView Geographic Information System software package and IDRISI software package for remotely sensed...
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)
Raed R. A-Naima, Sarah B. Al-Naima,
In this research, video file type (mov) is used to hide an English text. This method offered high accuracy and secure for data transitions. First, frames are extracted from video file. Then on...
FPGA Based Speed Control of a Separately Excited DC Motor
Maan M. Shaker, Nasseer M. Basheer, Qusay H. Ali,
An armature voltage control is used to control the supplied voltage of an armature of a 2 kW separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse...
Computer Monitoring and Security System Using Bluetooth Technology
Mhmood Shuker Majeed, Abdul Sattar Muhammad Khidhir, Firas Abdul Rahman Yosif
The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. The application has been accomplished using wireless...
Building an Information Network System for Retirees in the Province Nineveh
Azza H. Zaki, Elham S. Mustafa,
Information systems has become an important tool for improving the working efficiency of the organizations that have tended to design and build information systems for the purpose of control for...
Arabic Word Recognition Using Wavelet Neural Network
Enaam Ghanim Saeed, Yousra F. Al-Irhaim,
In this paper, a system is presented for word recognition using Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature parameters based on discrete...
Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset
Najlaa Badie Aldabagh, Mafaz Muhsin Khalil,
This paper compares between two models: Common Genetic algorithm and the new Clonal selection theory in the field of Intrusion Detection. Genetic algorithms (GA) which is a model of genetic...
Information Retrieval System for Digital Libraries Using Fuzzy Logic
Ghayda A.A. Al-Talib, Nawar Abdul Ghani
This research is one of the important steps towards processing the most significant challenge in digital libraries and web, which is computing documents rank, its importance, and its relevance to...
Improvement of Color Correction for Digital Photographs
Manar Younis Kashmola, Zahraa Mazin Al Kattan,
In other way misuse of correct illumination at the capture moment could affect the image landmarks ; regarding color brightness and the increasing color cast which might cause the image to appear...
Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix
Abeer A. Thanoon,
The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm of photographic and videoing treatment presents a method to trace the appearance...
Genetic Pattern Recognition using Intelligent Techniques
Omar Saber Qasim, Basil Younis Thanoon,
In this research a light is shed on converting DNA series to amino acid being responsible for forming protein through intelligent techniques. Some comparisons have been made between particularly...
Recognition of Eudiscoaster and Heliodiscoaster using SOM Neural Network
Raid R. AL-Nima,
This research is aimed to design an Eudiscoaster and Heliodiscoaster recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the fossils...
Adopting the Principle of Closed Set to People Identification Based on Human Hand Geometry
Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb,
We propose a Identification System Based on Human Hand Geometry Features, we extract 50 features to use it in recognition process. By constructing the principle of Close Set Identification System,...
Using Index Light Points to Determine Object Dimensions in the Digital Images
Sundus Khaleel Ebraheem,
Due to the huge development in the digital image processing scope and its wide used in many applications, and exist the needing in some applications such as engineering, military to find remotely...
Image Segmentation Based on New Modification on Normalized-Cut Algorithm
Khalil I. Alsaif
In this research, Normalized Cut algorithm was studied to segments any type of digital images which was widely used recently. In this paper wavelet transformation, and high-high frequency...
Adoption of Neural Networks to Classified the Gender of the Speaker
Khalil I. Al-Saif, Mason Kh. Al-Nuaimi,
In this research the neural network was adopted to classified the gender of the spoken, by creating the two dimension matrix from the parameters of the spoken speech signal which normal was snigle...
An Analytical Study of DNA Sequence
Basil Y. Thanoon, Fatima M Hasan,
This paper contains a general introduction to Bioinformatics, theirs goals, objectives and their applied fields. Is then shed light on the real views of DNA of humans, some processors use...
Hiding Techniques using Mp3
Ahmed S. Nori, Shyma Sh. Mohammed,
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the...
OLAP Techniques for Approximation and Mining Query Answering
Murtadaha M. Hamd, Waleed K. Hassan,
Data warehouse (DW) systems have become a key component of the corporate information system architecture, in which they play a crucial role in building business decision support systems by...
Skin Classification Based on Co-occurance Matrix
Khalil I. Alsaif, Shaimaa M. Mohi Al-Deen,
In this paper an algorithm will be achieved to look for the properties of the skin for group then try to classify the skin of the group depending on the four properties (energy, contrast,...
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts
Radwan Y. Al-Jawadi, Raid R. Al-Naima,
This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the...
The Use of Theory of Optimal Control on Mosul University Internet
Ahmed M. Al-Sabaawi, Muhammad A. Al-Kilani,
The theory of optimal control is considered one of the modern and developed subjects, especially which can be represented in a dynamic setting. One of the modern applications of the optimal control...
Remove Unimportant Features from True Colored Images Using the Segmentation Technique
Shahad A. Hasso,
In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class...
Denoise Digital Images Depending on Contourlet Transform
Khalil I. Al-Saif, Ahmed H. Saleh,
In this paper a new, proposed way to denoise an image under the impact of different types of noise experienced by the image acquired during media, where the reliance on contourlet transform because...
Straight Lines Detection Based on GA with New Modification on Baron's Method
Fawziya Mahmood Ramo, Nidhal H. Al-Assady, Khalil I. Al-Saif
In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some...
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network
Amera Istiqlal Badran, Abdulsattar M. Khidhir, laheeb Mohammed Ibrahim,
In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis...
Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data
Maha A. Hasso, Mona J. Siddiq,
The best band selection from remote sensing image plays an important roles in multispectral and hyperspectral remote sensing image processing due to the intercorrelation that inherent in the...
Digital Information Hiding Techniques
Alyaa Moufaq Abdul Majeed Haleem, Nadia M. Mohammed,
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the...
Chaotic Encryption Based on Biometric Key
Melad jader saeed, Saja J. Mohammed, Ielaf O. Abdul Majjed,
In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to...
Evaluating, and Scaling Web Programming Languages: A Comparison between PHP, JavaScript
Mahmood F. Abdullah,
This work concerns with comparing web server resources. The most known web programming languages (PHP-JavaScript) were presented. An age calculator implemented as a web application. Many readings...