Abdulrazak A. Mohammed, S. M. Hameed, ADlL H. Mohammed
{"title":"Quantifying the effect of the Temperature Variable on Optical Anisotropy of Line Spread Function at Image plane","authors":"Abdulrazak A. Mohammed, S. M. Hameed, ADlL H. Mohammed","doi":"10.24086/cocos2022/paper.471","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.471","url":null,"abstract":"It is well known that the variable of temperature degree will effect on the characteristics of any optical component especial lenses and mirrors, because this thermal variable will affect on thermal expansion of the optical component material, we can say (refractive index (n) of the material), Of course this effect will transfer to the ray tracing throw the optical components and which effect on the properties of the spot diagram of image forming. (Even the temperature is increasing or decreasing). When the rays intersect with the image plane, there will be a spot (the spot is intersected between two or more rays that intersect the image plane), the spot distribution will represent the image of the object. This is called a spot diagram. The spot diagram has an important property which are the sizes of spots and type of distribution. So, the thermal effect will appear in these properties of the spot diagram. The main properties of the lens that been affected by thermal is curvature of the surface (R), thickness, object and image planes position (the distances of object & image from the lens center, (S ,S’) are variables will make changing in the values of focal length of the lens (that means defocus) appear","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol","authors":"","doi":"10.24086/cocos2022/paper.567","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.567","url":null,"abstract":"The size of network and internet traffic is rising spontaneously by the day, with data usage at zettabyte to petabyte scale at an exponential high rate and therefore considered to generate huge traffic along the way which causes the chance of error in transmission to be high as well. Automatic Repeat Request (ARQ) protocol is an error control function for data transmission that uses acknowledgements. These protocols exist in Data link or Transport layers. ARQ is categorize into three major types such as Stop and wait, Go Bank N and Selective Repeat. Hybrid automatic repeat (HARQ) request which is an advancement to earlier mentioned protocols to detect error via cycle redundancy check was later developed. This paper evaluates the performance of these basic ARQs and HARQ protocols in consideration of the current state of high signal interference and collision during competitive accesses, more especially in highly densely networks.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"929 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123295218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A perspective on the Development of Quantum Computers and the Security challenges","authors":"Abdullah A. Nahi, Laith R. Flaih, Khalid F. Jasim","doi":"10.24086/cocos2022/paper.754","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.754","url":null,"abstract":"The amount of data produced and processed every day is increasing exponentially, and reaching unthinkable levels. This amount of data has to be stored and processed by something. While the conventional computers are reaching their limits in data storage and processing, and this dictates the need for a nano sized transistors.Quantum computers can provide genius solution for that issue. Quantum computing is an emerging interdisciplinary field in information technology. This technology acquired its name, because it is based on quantum physics. In this article we present a new perspectiveonthe progress in the research efforts on quantum computing technology and their likelihood to replace the conventional computers and change the way we manipulate data and information. Also we claim this might be the first article in the region tackling quantum technology.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, ,. H. Hashim Ibrahim
{"title":"Probabilistic prediction of geological status of tunnel route using the Markov method","authors":"A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, ,. H. Hashim Ibrahim","doi":"10.24086/cocos2022/paper.664","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.664","url":null,"abstract":"Minimizing the uncertainties related to the tunnels’ construction parameters is a crucial task that need to be addressed. Usually, the most uncertainties in underground structures are related to the unknown geological status. In order to probabilistically estimate these uncertainties, variety techniques have been developed, including the Markov method. This study is undertaken on a road tunnel in Iran in order to forecasting the geological status along its route using the Markov method. To access the Markov’s model input data, a number of questionnaires were distributed among the tunneling experts and eventually the mean values of the respondents were used in the model. In the next step, the results predicted by the Markov model were compared with the actual ones to evaluate the model performance. Finally, the Markov model was suggested as a powerful tool to predict tunnels’ path geology.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125269262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Systems Governance and Green Information Technologies","authors":"Laith R. Flaih","doi":"10.24086/cocos2022/paper.516","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.516","url":null,"abstract":"Information systems governance and green information technology are included in this review. More precisely, organizational activities. Every day, an increasing amount of organizations around the world adopt modern Green IT activities. However, though, it has little to do with corporate management and governance. A new structure for implementing Green IT governance is needed for this. Concerning these elements, Environmental sensitivity trends are pushing companies to take a new solution to this issue. Implementing green strategies has been a challenge for organizations that wish to remain ahead of the curve regarding social and environmental consciousness. The field of information technology, rather than any other, has proved to be a valuable tool and future friend of the environment (IT). Green IT and governance IT conducts in this region promote sustainability in and by IT. Organizations, however - owing to a lack of clear green IT principles and practices, helping them to perform some sustainable action - are at a major disadvantage in this respect. This research aims to show the researchers' findings of the value of Green IT and governance information systems in industry and organizations and the benefits of using them. The findings of this multi-count analysis illustrate the present state of Green IT organizations, their IT method of government, and problem-solving in a particular situation in their researchers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Reassigned Synchrosqueezing Transform and low-frequency shadows associated with gas detection.","authors":"R. Anvari, Adil Hussein Mohammed, S. Rashidi","doi":"10.24086/cocos2022/paper.767","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.767","url":null,"abstract":"Time-frequency representation, which has been widely used in seismic data inquiry, can reveal a parcel of useful data hidden inside the seismic data. We've introduced a previously unexplored seismic application of the high-resolution Time-Reassigned Synchrosqueezing Transform (TRSST), which can provide significantly sparser time-frequency representation than other methods. One of the most appealing aspects of the proposed technique is its ability to be entirely adaptable. For the flag examination representation and deterioration, various approaches have been presented. This paper used the TRSST to provide the time-frequency contour and stimulate the depiction of low-frequency shadows associated with hydrocarbons. It was also compared to the Short Time Fourier Transform (STFT), both of which are STFT-based time-frequency transforms.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134476480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulrazak Abdulsalam, Riyadh Mirza, Third C. Author
{"title":"Analyzing the Effective of Laser Spot Size on the Blood Clot","authors":"Abdulrazak Abdulsalam, Riyadh Mirza, Third C. Author","doi":"10.24086/cocos2022/paper.546","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.546","url":null,"abstract":"Blood clot is one of the series deceases for human body now a days. There are many types of blood clot depend on the location and type of the tissue. Blood clot causes when the blood flows into vessel and contact with specific material with the vessel wall. Lasers use in treatment of blood clots. The treatment of the blood clot is dependent on the type and the properties of used laser. One of the important proper of the laser is its spot size. Size of the blood clot and the laser beam have been analyzed. From the results we got the factor that gives a rescannable treatment.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Tracking System by Using GPS, GSM, and Arduino Technology","authors":"Firas Zeki Mahmood","doi":"10.24086/cocos2022/paper.833","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.833","url":null,"abstract":"The fleet system uses a very well-established technology called the vehicle tracking system, the fleet system is the owner of the automobile and vehicle movement of goods around the globe, this technology is very reliable and safe. There’s a proposition of a real-time tracking system in this paper and it’s going to create a system that can be used for positioning and tracking of any vehicle by using Global System for Mobile communication and Satellite navigation system (Global positioning system). This system is designed as an application and will continuously indicate the status of the vehicle by monitoring its movement on demand. The device used for tracking to know the vehicle’s location in real-time is made up of the SIM900A module, Arduino Uno R3, and NEO 6M GPS module. For accomplishing this the Arduino Uno R3 has to be serially interfaced with the GPS and GSM modules. For reporting the location of the vehicle continuously from a remote place the GSM module is used, while the other GPS module is continuously updating the Arduino of data such as latitude, speed, longitude, and distance traveled by using the satellite. For viewing the position of the vehicle on the map Google Map is used. By using the application the user can send a message of a number that is registered on the GSM that’s attached to the Arduino, by doing this. The user will be able to receive information like longitude, google map lining of the vehicle, and latitude by a text message. This proposal contains vehicle security, salesman tracking, and private drivers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Nashwan Abdulfattah, Abdullah A. Nahi, Yazen Saif Almashhadani
{"title":"Simulation framework to measure the effect of applying smart house on the power consumption","authors":"Ahmad Nashwan Abdulfattah, Abdullah A. Nahi, Yazen Saif Almashhadani","doi":"10.24086/cocos2022/paper.780","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.780","url":null,"abstract":"Distribution network operators are becoming increasingly interested in accurately anticipating load characteristics at the low voltage level. Energy disaggregation could be one of the potential approaches to exploit the massive amount of smart meter data to fulfill the task. Proper individual home appliance modelling is critical to the performance of NILM. In this paper, a hierarchical hidden Markov model (HHMM) framework to model home appliances is proposed. This model aims to provide better representation for those appliances that have multiple built-in modes with distinct power consumption profiles, such as washing machines and dishwashers. The dynamic Bayesian network representation of such an appliance model is built. A forward backward algorithm, which is based on the framework of expectation maximization (EM), is formalized for the HHMM fitting process. Tests on publicly available data show that the HHMM and proposed algorithm can effectively handle the modelling of appliances with multiple functional modes, as well as better representing a general type of appliances. A disaggregation test also demonstrates that the fitted HHMM can be easily applied to a general inference solver to outperform conventional hidden Markov model in the estimation of energy disaggregation.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117253829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Fadhil Jasim, Mohammad Hussein Shukur, Abdullah Abdulabbas Nahi Alrabeeah, Laith R. Fleih
{"title":"ANALYSIS THE SECURITY OF SOME CIPHERS IN INDUSTRIAL APPLICATIONS OF WIRELESS SENSORS NETWORKS","authors":"Khalid Fadhil Jasim, Mohammad Hussein Shukur, Abdullah Abdulabbas Nahi Alrabeeah, Laith R. Fleih","doi":"10.24086/cocos2022/paper.513","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.513","url":null,"abstract":"The wireless sensor networks played substantial role in many fields such as pollution monitoring system, health care system, military operations system, agriculture industries, bridges monitoring, and wastewater treatment systems. Various types of data are exchanged via these networks which can be exploited by intruders or unauthorized users. Hence, there is a demand to protect the data confidentiality in these networks. The cipher algorithms can be used to protect the data confidentiality in these networks. This research presents some applications of wireless networks. Moreover, the research focused on study some cipher algorithms and different features of these ciphers. In this context, the encryption keys, input block, encryption process, and components of these algorithms have been covered. Thus, these cipher algorithms can provide suitable level of protection for the WSN networks.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}