{"title":"Encryption of Association Rules Using Modified Dynamic Mapping and Modified (AES) Algorithm","authors":"Enaas M Hussein, Russeen M Hussain","doi":"10.1109/CAS47993.2019.9075701","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075701","url":null,"abstract":"Data mining which also sometimes called (knowledge discovery) or (data discovery) is the method of analysing hidden patterns of data according to different viewpoints of categorisation (clustering, classification, association rules, sequence mining) and find meaningful information. Retaining the security of the data when we need mining can be in a different technique according to data type, security need, and performance. This paper is focused on case there is need to obtain all the rules with highly sensitive data and for that reason using technique of regular Privacy-Preserving Data Mining (PPDM) will cause to hide some sensitive rules that intensely need it, proposed solution is by using encryption algorithm to secure the rules that get from mining algorithm.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predict the relationship between autism and the use of smart devices by children in the coming years using neural networks","authors":"Baidaa A. Atya, Omran T. Ali","doi":"10.1109/CAS47993.2019.9075775","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075775","url":null,"abstract":"Recently, autism has been particularly widespread among children. It is no secret that the use of smart devices has a significant impact on the emergence of this disease directly or indirectly. In this research, the disease was studied in two ways: First, identify the symptoms of the disease through a questionnaire that shows how to use smart devices by children and identify the disease by answering it. By using an artificial neural network, anyone can determine whether a person is infected or not. The second part is to determine the statistics of the disease in previous years and through the proportion extracted by the number of infected through the questionnaire can predict the number of infected in subsequent years and also using artificial neural networks. Through the results, we have been able to know the proportion of infected in subsequent years and thus can address this disease and make the use of smart devices are part of the treatment and not the one that helps the emergence of the disease. To complete this search using VB language.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sound Sensitivity Diagnosis System Based Cognitive Internet of Things and Cloud Computing","authors":"Eman K. Jassim, E. Al-Hemiary","doi":"10.1109/CAS47993.2019.9075759","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075759","url":null,"abstract":"Cognitive IoT is the next step in enhancing the efficiency and performance of complicated sensor-driven systems throughout learning human experience into the materials and circumstances that interact with. This paper introduces a system to diagnose the sensitivity toward sound by improving a mechanism based on facial emotions recognition system that combines with IoT protocols and cloud computing. The proposed system has been performed by incorporation of a cognitive IoT environment consisted of hardware and software components with a cloud. This system has been implemented in a laboratory to recognise the behaviour of people suffering from sensitivity to sound. This behaviour has been adopted by monitoring human face emotions through a live video capturing using camera and image processing using facial emotion recognition software. Emotions values obtained was examined and collected in a cloud using the MQTT protocol. These emotions have been categorised as normal and abnormal. Finally, several cases have been tested using this system, and five levels for sound sensitivity has been adopted. Sound intensity values ranged from 10−12 W/m2 up to 10−4W/m2.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adopting Run Length Features to Detect and Recognize Brain Tumor in Magnetic Resonance Images","authors":"Aya S Derea, H. K. Abbas, H. Mohamad, A. Al-Zuky","doi":"10.1109/CAS47993.2019.9075718","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075718","url":null,"abstract":"Early detection of brain cancer considered vital and attracted attention. In this study, a designed software presented to detect and recognise brain tumours. The segmentation based threshold used to detect the region of interest in Magnetic Resonance Imaging (MRI) images. Texture features were extracted using grey level run length matrix (GRLM), then detect tumours in MRI image and features image using a segmentation-based threshold technique. Location of the tumour in MRI and its features determined using the histogram as well as behaviour complement images for each feature. The geometrical characteristics determined of the tumour image as well as the complement image such as size, location, area and dimensions. The detection results depending on the segmentation technique were very effective in the separation of the entire tumour area. The quality of the texture features using GRLM has high accuracy by means separation of the tumour area from the complement area.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116959319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surface Patch Detection of 3D Point Cloud Using Local Shape Descriptor","authors":"S. A. Mahmood, Fatima Salah Mohamed","doi":"10.1109/CAS47993.2019.9075467","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075467","url":null,"abstract":"Visual saliency is determined through the perceptual information that enables to detect interesting regions in the query 3D models, which attracts human visual attention. Local descriptors are common and externally effective for various 3D tasks such as registration, object tracking object recognition and saliency detection. In this paper, we present a suitable solution of saliency regions-based surface patch detection in 3D point cloud images using pairwise 2D histograms of local descriptors constructed from both global and local geometry information. The local information is estimated based on the local descriptor formulated from the relation between 3D point and its neighboring points (neighbourhood points-based descriptor). The global information is estimated by extrusion shape descriptor based radial map construction. The proposed method has three well-defined steps for preprocessing workflow in order to prepare data points for salient region detection process composed of downsampling-outliers removal, normal vector computation for each point and neighbourhood determination for each point. From the experiments, the local shape descriptors adopted in this paper are reliable to detect more salient points-based surface patch detection in the 3D point cloud model. The experiments on a publicly point cloud database were attained high accuracy of the proposed surface patch detector.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Method as Pseudo-Random Bits Generator","authors":"Mohammed M. Al-Mhadawi, Akhlas A. Albahrani","doi":"10.1109/CAS47993.2019.9075715","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075715","url":null,"abstract":"This paper aims to combine among Exponential chaotic map, Linear Congruential Generators (LCG), Multiplicative Congruential Generators (MCG) and RIPEMD-160 to create new pseudo arbitrary number generator. The guideline of the proposed technique involves generating key sequences by Exponential chaotic map to be utilised as coefficients in Linear Congruential Generators and Multiplicative Congruential Generators that generate arbitrary numbers. Those randomised numbers are converted to binary numbers and be used as inputs in RIPEMD-160 that produce a stream of hexadecimal numbers which are transformed into a sequence of binary digits. These binary digits are arranged as 16 × 10 array and permuted using the shifting process for each row randomly. The new pseudo-random bit generator was successfully tested in the NIST statistical test. The statistical and security analysis indicates it has large key spaces, very sensitive initial conditions and resistance to brute force and differential attack.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128708386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar
{"title":"Design and Implementation Voice Scrambling Model Based on Hybrid Chaotic Signals","authors":"Sattar B. Sadkhab, Ammar M. Raheema, Sinan M. Abdul Sattar","doi":"10.1109/CAS47993.2019.9075626","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075626","url":null,"abstract":"One of the most common theories used in cryptography is chaos theory, as it has sufficient encryption properties. Such properties can be used to analyse diffusion and confusion processes, which is one of cryptography's key features; a speech scrambling is an important tool in wireless communication systems for enhancing data security. The main target is achieving security to resist malicious eavesdroppers and attacks. This paper presents a speech scrambling model using three various chaotic maps/flows (standard map SM, Unified system US and Chen system CS). The use of the chaotic keys in scrambling techniques are to enhance the transmitted data security, which is strong over the effects of AWGN. Five different tests were included in the evaluation measures: cepstral distance dCD, Linear predict coding distance dLPC, Mean Square Error MSE, Entropy H, and Correlation Factor Rc. The important criteria are residual intelligibility of speech signal between the (original and scrambling/descrambling signal) for the proposed models. The results are good enough to protect the encryption signal of the brute force attack, and when applying a model, the results are being evaluated. The offered model was carried out using SIMULINK (R2018b) by using MATLAB.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightness enhancement for video images based on nonlinear filter","authors":"R. Habeeb, Hana' H. Kareem, Adnan R. Ahmed","doi":"10.1109/CAS47993.2019.9075745","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075745","url":null,"abstract":"It is difficult to enhance low-light video images, because of the irregularity of lightness for each frame and due to the length of execution time required for enhancement. In this research, the videos were optimised using a method based on the development of the technique of the histogram equalisation by using the sigmoid function as a non-linear conversion of the light function in the HSV colour space, this algorithm called Adapted Histogram-Equalization based on Sigmoid Function (AHSF). In order to know the efficiency of the enhancement of the videos, the proposed method was compared with several other methods including traditional as Histogram Equalization (HE) and Multi-Scale Retenix with Color Restoration (MSRCR) non-traditional as Fusion at Weakly Illuminated Images (FWII), This comparison was made by calculating the entropy rate for each video as well as calculating the execution time. By analysing the results, it was found that the proposed algorithm AHSF has good results in improvement and less implementation time.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of diodes integrated on radiating patch or ground plane of frequency reconfigurable antenna on antenna performance - a Comparison study","authors":"Alaa Imran Al-Muttairi, M. Farhan","doi":"10.1109/CAS47993.2019.9075459","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075459","url":null,"abstract":"In this paper, a comparison study is carried to clarify the effects of electronic switches on antenna performance if these diodes are fixed on the ground plane or the radiating patch. In each case, each switch is modelled in three different ways, namely: ideal switch, beam-lead, and PIN diode to verify the concept. Two semi-identical frequency reconfigurable antennas are designed and simulated for this comparison. The first antenna depends on rectangular-slot etched in the ground plane to change operating frequency while the other uses rectangular-slot in the patch. The results show that PIN diodes which integrated into the ground plane give the minimum loading effect on antenna performances. Furthermore, the study can provide a good starting point for any researcher who attends to design reconfigurable antenna.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muna R. Salman, Khalid F. A. Hussein, Alaa K. Farhan
{"title":"Color Image Encryption Depend on DNA Operation and Chaotic System","authors":"Muna R. Salman, Khalid F. A. Hussein, Alaa K. Farhan","doi":"10.1109/CAS47993.2019.9075458","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075458","url":null,"abstract":"In the recent years, the interest in information security has increased due to the great development of modern technology in the world, which led to the increase of the various attacks on data and essential information. Therefore it was necessary to have encryption techniques that protect the transmitted information In this study, a new algorithm of colour image encryption based on DNA and the chaotic map is proposed. The diffusion is achieved by using the processes of shifting and permutation, and the confusion is achieved by using the processes of S-box and mathematics. This algorithm was applied to different image sizes and type (bmp, jpeg). The proposed algorithm is intended to be complex and repel attacks. The shifting process is done on colours (R, G, B) from left to right, giving new pixels different from the old ones. The hexadecimal process and box-S are applied to the blue colour to increase confusion. The process of computing of DNA takes place in two colours (red and green). Pixel locations are altered by permutation (R, G, B) become (B, R, G) this process to increase diffusion. Finally, mathematical operation take place (blue, red) decomposes pixels and increase confusion. This algorithm has a highly sensitive key and can cope with various attacks due to the use of DNA computing and chaotic system.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}