{"title":"ICOASE 2018 Cover Page","authors":"","doi":"10.1109/icoase.2018.8548897","DOIUrl":"https://doi.org/10.1109/icoase.2018.8548897","url":null,"abstract":"","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast QR Decomposition Based on FPGA","authors":"S. Omran, Ahmed K. Abdul-abbas","doi":"10.1109/ICOASE.2018.8548895","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548895","url":null,"abstract":"The QR-decomposition (QRD) is an implementation necessary for many different detection algorithms such as MIMO (Multiple Input and Multiple Output) in wireless communication system. In this article, a QRD processor which decomposes the matrix into an orthogonal (Q matrix) and upper triangular matrix (R matrix) using Gram Schmidt algorithm is designed and implemented using a 32-bit High speed processor based on FPGA. This design requires 16 clock cycle to compute QR decomposition with 15.625 M QRDs per second throughput at 250 MHz operating frequency.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigate the Carbon distribution and Structural Group Composition of Two Kurdistan Crude Oils (T-21A & PF2) and Their Fractions","authors":"S. Simo, Salah Aldin Naman, Kn Ahmed","doi":"10.1109/ICOASE.2018.8548925","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548925","url":null,"abstract":"For the first time, a determination of the total content of oil fractions in KRG was made using two samples of Kurdistan crude oils on the basis of the n-d-M method. To determine the structural-group composition of crude oil, it was proposed to use Tawke T-21A and Shekhan PF2 Crude oils. This paper is devoted to the study structural group of crude oil of different deposited differs from each other in physical and chemical properties. Since the properties of the oil determine the direction and application in petroleum refinery of its processing, to assess the quality of oil n-d-M method.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating and Mapping Aboveground Biomass of Natural Quercus Aegilops Using WorldView-3 Imagery","authors":"M. H. Obeyed, Yaseen T. Mustafa, Zeki M. Akrawee","doi":"10.1109/ICOASE.2018.8548859","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548859","url":null,"abstract":"Biomass estimation is a tool for assessing the amount of carbon stores in trees. An approach is presented to estimate aboveground biomass (AGB) of the scattered individual Quercus aegilops using very high resolution satellite imagery, WorldView-3 (WV3). First, an in-situ allometric model at tree level was developed, and AGB was estimated using the Diameter at Breast Height (DBH). Next, the allometric relationship between Tree Crown Area (TCA) derived from WV3 data and estimated in-situ AGB was investigated and used in the resulting model to estimate AGB (remote sensing derived). As a result, the developed allometric model in-situ produced a correlation of R2 = 0.99, and the developed allometric model remote sensing produced a correlation of R2 = 0.94. Tree AGB estimated from WV3 data was a good technique with a 1.24 bias and a root mean square error (RMSE) of 80.17. This approach can be used to accurately estimate and map AGB of scattered individual trees.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. A. Zebari, H. Haron, Subhi R. M. Zeebaree, Diyar Qader Zeebaree
{"title":"Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations","authors":"D. A. Zebari, H. Haron, Subhi R. M. Zeebaree, Diyar Qader Zeebaree","doi":"10.1109/ICOASE.2018.8548824","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548824","url":null,"abstract":"Networks have evolved very rapidly, which allow secret data transformation speedily through the Internet. However, the security of secret data has posed a serious threat due to openness of these networks. Thus, researchers draw their attention on cryptography field for this reason. Due to the traditional cryptographic techniques which are vulnerable to intruders nowadays. Deoxyribonucleic Acid (DNA) considered as a promising technology for cryptography field due to extraordinary data density and vast parallelism. With the help of the various DNA arithmetic and biological operations are also Blum Blum Shub (BBS) generator, a multi-level of DNA encryption algorithm is proposed here. The algorithm first uses the dynamic key generation to encrypt sensitive information as a first level; second, it uses BBS generator to generate a random DNA sequence; third, the BBS-DNA sequence spliced with a DNA Gen Bank reference to produce a new DNA reference. Then, substitution, permutation, and dynamic key are used to scramble the new DNA reference nucleotides locations. Finally, for further enhanced security, an injective mapping is established to combine encrypted information with encrypted DNA reference using Knight tour movement in Hadamard matrix. The National Institute of Standard and Technology (NIST) tests have been used to test the proposed algorithm. The results of the tests demonstrate that they effectively passed all the randomness tests of NIST which means they can effectively resist attack operations.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. A. AL-Hashemi, G. Al-Suhail, Sinan M. Abdul satar, A. N. Kareem, M. A. Hussein
{"title":"An ICI Reduction Based on PAPR Clipping in Coherent Optical OFDM System","authors":"L. A. AL-Hashemi, G. Al-Suhail, Sinan M. Abdul satar, A. N. Kareem, M. A. Hussein","doi":"10.1109/ICOASE.2018.8548855","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548855","url":null,"abstract":"The Inter-Carrier Interference (ICI) compensation for Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) system has been studied in this paper. The purpose behind is to investigate the presence of ICI due to the impact of Laser Phase Noise (LPN) and Fiber Non-Linearity (FNL). Thereby, we propose a simple clipping scheme which represents an effective distortion algorithm to decrease the Peak to Average Power Ratio (PAPR) for 4QAM system. The method exhibits a significant process on ICI cancellation in CO-OFDM system. The OFDM signal is basically transmitted along 550km distance rated at 10Gbps single mode fiber for the coherent optical mode. The new findings show that the receiver sensitivity is highly improved below 10−3 FEC for laser power 5dBm; and archives about 1dBm to 2.4dBm when laser power becomes 8dBm at a typical clipping ratio of 0.6. In particular, the system exhibits a good performance over a 385km transmission distance in comparison to the conventional CO-OFDM. As a result, the proposed clipping shows that the system can enhance its the performance by reducing ICI in the CO-OFDM system; in addition to present a high robustness in BER metric against FNL by a clear reduction in PAPR.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artifact Paths Removal Algorithm for Ultra-wideband Channels","authors":"Y. Zahedi, R. Ngah","doi":"10.1109/ICOASE.2018.8548815","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548815","url":null,"abstract":"Channel impulse responses (CIRs) are extracted from measured waveforms based on a deconvolution process. In the case of Ultrawideband (UWB) communications, CIRs are extracted from measured UWB waveforms using some deconvolution algorithms, where CLEAN deconvolution algorithm is a well-known procedure for this aspect. However, the extraction of UWB CIRs is mostly prone to errors that are shown as artifact paths in the extracted CIRs. These artifact paths are represented as multipath components within the CIRs. In order to obtain more accurate CIRs, the artifact paths need to be eliminated. In this work, an algorithm is developed to remove the generated artifact paths available within UWB CIRs due to CLEAN utilization. The artifact paths removal (APR) algorithm has been developed based on the elliptical modeling concept applied for wideband channels. Results show that the APR algorithm has successfully removed the artifact paths from UWB CIRs. Moreover, a slight enhancement of the received power has been seen due to the removal of these weaker paths.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Table Lookup Substitution Method for Hiding Data in DNA","authors":"H. I. Hussein, W. M. Abduallah","doi":"10.1109/ICOASE.2018.8548863","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548863","url":null,"abstract":"Concealing confidential messages within DNA sequences has turned into a well-known research in latest years. This paper presents a modified scheme which is based on the Table Lookup Substitution Method (TLSM) to increase its security. The proposed scheme uses an 8-bit binary coding to transform a reference DNA sequence into a binary format to increase the security of the original TLSM. A comparison between the proposed modified scheme with the existing schemes besides the original TLSM is presented. The results and comparisons have proven the ability of the proposed scheme in balancing among the three critical properties for any DNA steganography scheme: capacity, payload, and BPN. In addition, the cracking probability of the proposed modified scheme is more complex than the original TLSM.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Evaluation of a Course Recommender System Using Content-Based Approach","authors":"A. A. Neamah, A. El-Ameer","doi":"10.1109/ICOASE.2018.8548789","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548789","url":null,"abstract":"Finding a user relevant information among huge number of data that are available in web is a difficult process. Therefore, an information filtering technique is needed to help the users to find their desired contents. Recommender system is the most famous technique which is used nowadays in many websites to support the suggestions making process. This paper will explain how to design a course recommender system by using kNN and Naïve Bayes classification algorithms, and evaluate their performances. The proposed recommender system follows content-based approach, by building a user profile (model), based on his/her prior knowledge and actions like, enrolling and rating courses, and compare it with courses attributes to generate recommended courses.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Security Evaluation Method for Bluetooth E0 Based on Fuzzy Logic","authors":"Sameer H. Alibadi, S. Sadkhan","doi":"10.1109/ICOASE.2018.8548918","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548918","url":null,"abstract":"The security level is very important in Bluetooth, because the network or devices using secure communication, are susceptible to many attacks against the transmitted data received through eavesdropping. The cryptosystem designers needs to know the complexity of the designed Bluetooth E0. And what the advantages given by any development performed on any known Bluetooth E0 Encryption method. The most important criteria can be used in evaluation method is considered as an important aspect. This paper introduce a proposed fuzzy logic technique to evaluate the complexity of Bluetooth E0 Encryption system by choosing two parameters, which are entropy and correlation rate, as inputs to proposed fuzzy logic based Evaluator, which can be applied with MATLAB system.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}