{"title":"Alcohol Filled Side-Hole Fiber Tilted Fiber Bragg Grating for Temperature Measurements","authors":"R. K. Ahmed, K. Hajim","doi":"10.1109/NTCCIT.2018.8681184","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681184","url":null,"abstract":"A compact temperature sensing element based on tilted fiber Bragg grating (TFBG) is filed with an alcohol and written in side-hole fiber. The sensing element is first proposed and experimentally demonstrated. The tilted fiber Bragg grating is written in side hole fiber. The transmission spectrum of TFBG sensor has two resonant dips. The wavelengths are sensitive to the change of refractive index of the traditional alcohol filled side-hole fiber. Experimental results show a high temperature sensitivity reaches to 15 pm/ °C for 10 mm TFBG length written in 7cm-long side hole fiber used which about 1.5 times higher than that of FBG sensing element.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Performance of Patch Antenna For IEEE 802.16e Applications Using Multi-layer Antenna Structure with Reflector","authors":"S. N. Nafea","doi":"10.1109/NTCCIT.2018.8681183","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681183","url":null,"abstract":"Low side lobe level with low cost multilayer antenna for IEEE 802.16e applications such as WiMAX over industrial, scientific, and medical (ISM) band (5.725 – 5.875) GHz was presented shows high gain of 12.60 dB and fort-to-back ratio (F/B) of 18.55 dB with bandwidth around 163 MHz. The proposed multilayer antenna with reflector (MAWR) composed of a single plane feeding patch printed on Rogers RT/ Duroid 5880 substrate, covered with four Rogers RO6006 superstrates while a reflector layer located under feeding patch. Adding superstrate and reflector layers caused performance improvement by increasing gain and bandwidth with input reflection coefficient and side lobe level reduction. Computer Simulation Technology (CST) Microwave Studio was used as simulation environment.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"58 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Posteriori Error Analysis for Semidiscrete Semilinear Parabolic Problems","authors":"Mohammad Sabawi","doi":"10.1109/NTCCIT.2018.8681193","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681193","url":null,"abstract":"Optimal order a posteriori error bounds in $L_{infty }(L_{2})$ norm are derived for semidiscrete semilinear parabolic problems using various assumptions on the forcing term. Standard continuous Galerkin (conforming) finite element method is employed. Our main tools in deriving these error estimates are the elliptic reconstruction technique, with the aid of Grönwall’s lemma and continuation argument.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"61 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132639455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Abed aljabar Al-Samawi, A. Atiyah, Sarmed hmzah ail
{"title":"Control of Reactive Power Based on Lévy Flight","authors":"Ali Abed aljabar Al-Samawi, A. Atiyah, Sarmed hmzah ail","doi":"10.1109/NTCCIT.2018.8681188","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681188","url":null,"abstract":"Optimal power flow is the main economic problem in power system operation. The Modified Cuckoo Search for Reactive Power (MCSRP) based on conventional Cuckoo search algorithm is suggested in this paper to solve the problem of optimal reactive power. Minimization of loss in addition to the maximization of voltage stability led to reducing the overall cost of the system. To cope with these issues, the Cuckoo search has been presented to handle effectively in this problem. This proposed algorithm has been tested on IEEE 30 – bus system and the obtained result are compared to that from another algorithm. Simulation result show that the proposed algorithm is more efficient for solving the objective function in power loss system. This algorithm is a practical study to calculate energy losses and is the best method used in economic calculations.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123047339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTE Signal Detection Using Two-Stage Cooperative Compressive Sensing System","authors":"M. M. Ali, M. Alghrairi, E. H. Salman","doi":"10.1109/NTCCIT.2018.8681191","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681191","url":null,"abstract":"The limited resources of spectra is still an issue for internet of things, commercial transmissions, high power consumed in front ends, and green communications applications. In this paper, a compressive sensing to detect a wideband long term evolution (LTE) signal has been proposed. Since such signals have a higher power, costly receiver hardware is required. In literature, many of traditional compressive sensing systems are suffered from mathematical complexity to reconstruct the original signals. Nonetheless, the reconstruction process is not required in the proposed system rather than the noise is decreased to enhance the sensing process. To achieve this goal, the proposed system contains two compression cascaded stages; discrete Daubechies transform and discrete cosine transform. The results uncovered significant sensing performance with a more than 50% compression ratio for centralized cooperative secondary users.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117338696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Trajectories Similarity Measures in Mining Algorithms","authors":"Musaab Riyadh, N. Mustapha, Dina Riyadh","doi":"10.1109/NTCCIT.2018.8681186","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681186","url":null,"abstract":"Trajectory similarity can be defined as the cost of transforming one trajectory into another based on certain similarity function. It is the core of numerous mining tasks such as clustering, classification, outlier detection, and indexing. Various approaches have been suggested to measure the similarity between pair of trajectories based on their geometric properties, the overlapping between their segments, the confined area between them, and semantic concept. This study aims to highlight and evaluate these approaches in term of their computational cost, usage memory, accuracy, and the amount of data, which is required to process in advance in order to determine its suitability to static or stream mining applications. The evaluation results concludes that the stream mining applications support similarity methods which have low computational cost and memory, single scan on data, and free of mathematical complexity due to high speed generation of data.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem
{"title":"Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm","authors":"Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem","doi":"10.1109/NTCCIT.2018.8681181","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681181","url":null,"abstract":"this paper is using the fingerprints as a biometric technique to ensure the security of the system. The steganography technique used for hiding data, the image media file is used as cover then embedding the secret data (feature and PIN) inside it.The procedure of this work includes taking the fingerprint image of the person, after that the image should be enhanced due to its low quality and preprocessing steps. After that is dividing the image to numbers of blocks and extracting the features such as (probability to each gray levels, mean, energy and effective pixels to each block) from this image by using Particle Swarm optimization (PSO) algorithm.Later the cryptography step is implemented based on feature that will be taken from nature inspired algorithm. Finally, selecting two hundred blocks from eight images to same person (fingerprint) to work for a high capacity based on histogram reversible data hiding algorithm with a comparatively lower deformation introduced after inserting the secret message.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116217595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint RRH Selection and Power Allocation forEnergy-Efficient C-RAN Systems","authors":"I. Hburi, H. Khazaal","doi":"10.1109/NTCCIT.2018.8681192","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681192","url":null,"abstract":"This paper addresses the energy efficiency (EE) based Remote Radio Heads (RRHs) selection problem in cloud radio-access network. In specific, a low-complexity 2-stage iterative algorithm is developed for this purpose by jointly employing the coordinated multi-point (CoMP) and user-clustering techniques. The first stage of the algorithm comprises of two steps, the first step applies a greedy search to activate preferred RRHs for CoMP transmission. The second step forms corresponded user clusters, only a RRH j with good channel gain could be included in the serving cluster of user k. Next, in the second stage, a simple interior point method is utilised for power control. Our obtained findings confirm that the transmit power, RRH density, and the number of users served by these RRHs can significantly affect the EE. Also, the results show that under certain system settings the proposed scheme can reduce the number of active RRHs in the network by almost 13.3% compared to conventional CoMP technique applied in LTE-A standard.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suitability of Using Julia Set Images as a Cover for Hiding Information","authors":"N. Q. Mohammed, Q. M. Hussein, M. S. Ahmed","doi":"10.1109/NTCCIT.2018.8681185","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681185","url":null,"abstract":"Steganography is a technique that is used to secret information in a cover media that ensure the secrete of messages and their existence, not notice from others. A blind steganography means that secret information can be extracted without need the original cover image. Different types of media are used as a cover in stenography techniques, such as text, image, audio or video. One of these techniques was the image that created by using algebraic Fractals, Julia set is a type of algebraic fractal, which it can be used as a cover to embedded text or images in blind steganography technique. This method used in many thesis and papers. The aim of this paper focuses on the weak points and limitations of using fractal images, especially Julia sets images, as a cover in steganography system that may contribute in detect the hidden information within these images. The importance of this paper, it gives a hint to steganography system designer to avoid these weak points which threat the security of their systems.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory","authors":"Dr. Sattar B. Sadkhan, Dhilal M. Reda","doi":"10.1109/NTCCIT.2018.8681178","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681178","url":null,"abstract":"One of the most important strength features of crypto-system’s is the key space. As a result, whenever the system has more key space, it will be more resistant to attack. The weakest type of attack on the key space is Brute Force attack, which tests all the keys on the ciphertext in order to get the plaintext. But there are several strategies that can be considered by the attacker and cryptographer related to the selection of the right key with the lowest cost (time). Game theory is a mathematical theory that draws the best strategies for most problems. This research propose a new evaluation method which is employing game theory to draw best strategies for both players (cryptographer & attacker).","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"30 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}