Volume 7 Issue 3

Published: 2025-06-25

Contents


Research Paper
General Regression Neural Network Application for Dynamic Data Compression and Decompression

safwan hasoon, Susan Hassan Mohammed

In the last decade have been witnessed a great development in artificial intelligence especially in neural network .This paper have been employed neural networks techniques for data compression and...

Pages: 73-80
Parallel Direct Search Methods

Bashir M. Khalaf, Mohammed W. Al-Neama,

Mostly minimization or maximization of a function is very expensive. Since function evaluation of the objective function requires a considerable time. Hence, our objective in this work is the...

Pages: 51-60
Using Genetic Algorithm to Estimate (RNA) Estimator

Ban Ahmed Mitras, Farah Saad Nashat,

In this paper the genetic algorithm has been used to estimate the parameter which exist in Boltzmann Distribution which controls the structure of the Ribo Nucleic Acid (RNA). Two algorithms have...

Pages: 145-160
Two Approaches for Implementing & Improving Building Automation System (BAS)

Qutaiba I. Ali, Bashar Abdulazez, Nassr Meacer,

Building Automation Systems (BAS) are used to both improve the indoor climate in buildings and to reduce the operational costs. In this paper, two approaches were used to implement a networked BAS....

Pages: 153-168
An Investigation for Steganography using Different Color System

Ahmed S. Nori, Amira B. Sallow, Zahraa M. Taha,

Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In...

Pages: 91-108
Digital Image Watermarking using Singular Value Decomposition

Sura Ramzi Sheriff,

This paper presents a digital image watermarking that applied theory of linear algebra called Singular Value Decomposition (SVD) to digital image watermarking .SVD watermarking scheme, which...

Pages: 187-200
Building a Spatial Database by Developing a Work Environment to Accomplish the Automatic Transfer Process for Remote Sensing Data from Raster to Linear

Diaa Hazem Al-Berhawi,

In this paper a develop an working environment for building spatial database by utilizing ArcView Geographic Information System software package and IDRISI software package for remotely sensed...

Pages: 295-308
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)

Raed R. A-Naima, Sarah B. Al-Naima,

In this research, video file type (mov) is used to hide an English text. This method offered high accuracy and secure for data transitions. First, frames are extracted from video file. Then on...

Pages: 173-182
FPGA Based Speed Control of a Separately Excited DC Motor

Maan M. Shaker, Nasseer M. Basheer, Qusay H. Ali,

An armature voltage control is used to control the supplied voltage of an armature of a 2 kW separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse...

Pages: 177-186
Computer Monitoring and Security System Using Bluetooth Technology

Mhmood Shuker Majeed, Abdul Sattar Muhammad Khidhir, Firas Abdul Rahman Yosif

The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. The application has been accomplished using wireless...

Pages: 19-32
Building an Information Network System for Retirees in the Province Nineveh

Azza H. Zaki, Elham S. Mustafa,

Information systems has become an important tool for improving the working efficiency of the organizations that have tended to design and build information systems for the purpose of control for...

Pages: 273-294
Arabic Word Recognition Using Wavelet Neural Network

Enaam Ghanim Saeed, Yousra F. Al-Irhaim,

In this paper, a system is presented for word recognition using Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature parameters based on discrete...

Pages: 81-90
Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset

Najlaa Badie Aldabagh, Mafaz Muhsin Khalil,

This paper compares between two models: Common Genetic algorithm and the new Clonal selection theory in the field of Intrusion Detection. Genetic algorithms (GA) which is a model of genetic...

Pages: 121-140
Information Retrieval System for Digital Libraries Using Fuzzy Logic

Ghayda A.A. Al-Talib, Nawar Abdul Ghani

This research is one of the important steps towards processing the most significant challenge in digital libraries and web, which is computing documents rank, its importance, and its relevance to...

Pages: 243-258
Improvement of Color Correction for Digital Photographs

Manar Younis Kashmola, Zahraa Mazin Al Kattan,

In other way misuse of correct illumination at the capture moment could affect the image landmarks ; regarding color brightness and the increasing color cast which might cause the image to appear...

Pages: 57-76
Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix

Abeer A. Thanoon,

The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm of photographic and videoing treatment presents a method to trace the appearance...

Pages: 91-104
Genetic Pattern Recognition using Intelligent Techniques

Omar Saber Qasim, Basil Younis Thanoon,

In this research a light is shed on converting DNA series to amino acid being responsible for forming protein through intelligent techniques. Some comparisons have been made between particularly...

Pages: 161-172
Recognition of Eudiscoaster and Heliodiscoaster using SOM Neural Network

Raid R. AL-Nima,

This research is aimed to design an Eudiscoaster and Heliodiscoaster recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the fossils...

Pages: 141-152
Adopting the Principle of Closed Set to People Identification Based on Human Hand Geometry

Maha Abd Alrahman Al-Hasoo, Zeena N. Al-kateeb,

We propose a Identification System Based on Human Hand Geometry Features, we extract 50 features to use it in recognition process. By constructing the principle of Close Set Identification System,...

Pages: 105-120
Using Index Light Points to Determine Object Dimensions in the Digital Images

Sundus Khaleel Ebraheem,

Due to the huge development in the digital image processing scope and its wide used in many applications, and exist the needing in some applications such as engineering, military to find remotely...

Pages: 31-46
Image Segmentation Based on New Modification on Normalized-Cut Algorithm

Khalil I. Alsaif

In this research, Normalized Cut algorithm was studied to segments any type of digital images which was widely used recently. In this paper wavelet transformation, and high-high frequency...

Pages: 33-40
Adoption of Neural Networks to Classified the Gender of the Speaker

Khalil I. Al-Saif, Mason Kh. Al-Nuaimi,

In this research the neural network was adopted to classified the gender of the spoken, by creating the two dimension matrix from the parameters of the spoken speech signal which normal was snigle...

Pages: 47-56
An Analytical Study of DNA Sequence

Basil Y. Thanoon, Fatima M Hasan,

This paper contains a general introduction to Bioinformatics, theirs goals, objectives and their applied fields. Is then shed light on the real views of DNA of humans, some processors use...

Pages: 259-272
Hiding Techniques using Mp3

Ahmed S. Nori, Shyma Sh. Mohammed,

In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the...

Pages: 209-226
OLAP Techniques for Approximation and Mining Query Answering

Murtadaha M. Hamd, Waleed K. Hassan,

Data warehouse (DW) systems have become a key component of the corporate information system architecture, in which they play a crucial role in building business decision support systems by...

Pages: 201-212
Skin Classification Based on Co-occurance Matrix

Khalil I. Alsaif, Shaimaa M. Mohi Al-Deen,

In this paper an algorithm will be achieved to look for the properties of the skin for group then try to classify the skin of the group depending on the four properties (energy, contrast,...

Pages: 41-50
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts

Radwan Y. Al-Jawadi, Raid R. Al-Naima,

This research aims in the first stage to built a cipher system using hybrid Genetic Algorithm with single layer Neural network to prevent any data attack during the transition process , where the...

Pages: 77-90
The Use of Theory of Optimal Control on Mosul University Internet

Ahmed M. Al-Sabaawi, Muhammad A. Al-Kilani,

The theory of optimal control is considered one of the modern and developed subjects, especially which can be represented in a dynamic setting. One of the modern applications of the optimal control...

Pages: 19-30
Remove Unimportant Features from True Colored Images Using the Segmentation Technique

Shahad A. Hasso,

In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class...

Pages: 121-134
Denoise Digital Images Depending on Contourlet Transform

Khalil I. Al-Saif, Ahmed H. Saleh,

In this paper a new, proposed way to denoise an image under the impact of different types of noise experienced by the image acquired during media, where the reliance on contourlet transform because...

Pages: 227-242
Straight Lines Detection Based on GA with New Modification on Baron's Method

Fawziya Mahmood Ramo, Nidhal H. Al-Assady, Khalil I. Al-Saif

In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some...

Pages: 61-72
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

Amera Istiqlal Badran, Abdulsattar M. Khidhir, laheeb Mohammed Ibrahim,

In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis...

Pages: 199-208
Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data

Maha A. Hasso, Mona J. Siddiq,

The best band selection from remote sensing image plays an important roles in multispectral and hyperspectral remote sensing image processing due to the intercorrelation that inherent in the...

Pages: 135-144
Digital Information Hiding Techniques

Alyaa Moufaq Abdul Majeed Haleem, Nadia M. Mohammed,

Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the...

Pages: 109-120
Chaotic Encryption Based on Biometric Key

Melad jader saeed, Saja J. Mohammed, Ielaf O. Abdul Majjed,

In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to...

Pages: 183-198
Evaluating, and Scaling Web Programming Languages: A Comparison between PHP, JavaScript

Mahmood F. Abdullah,

This work concerns with comparing web server resources. The most known web programming languages (PHP-JavaScript) were presented. An age calculator implemented as a web application. Many readings...

Pages: 169-176