{"title":"Developed clustering approaches to enhance the data transmissions in WSNs","authors":"S. T. Hasson, Hawraa Abd Al-kadhum","doi":"10.1109/CRCSIT.2017.7965541","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965541","url":null,"abstract":"Wireless sensor networks (WSNs) usually build from huge number of randomly deployed sensor nodes in certain area. The sensors are mainly utilized to monitor physical and environmental conditions, gather information, process this data locally and transfer the sensed data back to the Base Station (BS). The main objective of this paper is to simulate, evaluate and observe the behavior of developed clustering approaches and compare their performance metrics. In this study all the cluster nodes must sensing certain data and transmit it to its cluster head (CH). These data will be collected at particular nodes known as cluster heads that is previously assigned for each cluster. The CH aggregates the data and forwards it to the base station or a node sink. In this study two developed clustering approaches are suggested and created using Net Logo (5.2.1 version 2015). These approaches are Extreme node and double Extreme nodes. In addition to these two approaches, the DB-Scan clustering approach is also suggested to be used as a reference to compare its results with these two suggested algorithms. Results show certain improvement in these suggested algorithms. Many performance metrics can be used to Measure the performance of the suggested WSN such as NRL, PDF, End-to-end and throughput.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125037038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. M. Taqi, Fadwa Al-Azzo, M. Mariofanna, Jassim M. Al-Saadi
{"title":"Classification and discrimination of focal and non-focal EEG signals based on deep neural network","authors":"A. M. Taqi, Fadwa Al-Azzo, M. Mariofanna, Jassim M. Al-Saadi","doi":"10.1109/CRCSIT.2017.7965539","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965539","url":null,"abstract":"In this paper, a new model of focal and non-focal electroencephalography classification is carried out using a deep neural network (DNN). The Convolution Architecture For Feature Extraction (Caffe) framework with three different models (LeNet, AlexNet, and GoogLeNet) are applied, where the DNN is trained with different training epoch values (TEs). The performance of discriminating the focal and non-focal EEG signals using soft-max classifier is investigated. This classification serves medical specialists for taking a surgery decision of focal epilepsy patient. In this work, the EEG signals acquired from EEG database in literature works for five epilepsy patients are used for examining the proposed scheme. The results demonstrate a significant performance in terms of the classification accuracy and the remarkable short running time, via few numbers of the training epochs (TEs). However, the first model (LeNet) displays the best performance. Overall, the proposed classification approach provides a better performance as compared with the existing state-of-the-art techniques. Classification accuracy result is 100% for LeNet model at TE=2, while the accuracy of AlexNet reaches to 100% at TE=5, and finally, GoogLeNet touches an accuracy of 100% at TE=10.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126969174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robot path planning based on PSO and D∗ algorithmsin dynamic environment","authors":"A. Sadiq, Ali Hadi Hasan","doi":"10.1109/CRCSIT.2017.7965550","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965550","url":null,"abstract":"This paper proposes two new approaches of robot path planning in dynamic environments based on D∗ algorithm and particle swarm optimization. Generally speaking, the grid method is used to decompose two-dimensional space to build class node which contains the information of the space environment. D∗ algorithm analyze the environment from the goal node and computes the cost for each node to the start node. In the first approach, Lbest PSO algorithm is used to move the robot from the start node through dynamic environment which contains dynamic obstacle moving in free space by finding and displaying the optimal path. In the second approach a method is developed to manipulate the gate raise state where the robot cannot pass this node unlike D∗ algorithm. Some experimental results are simulation in different dynamic environments, show that in second approach the robot reaches its target without colliding obstacles and finds the optimal path with minimum iterations, minimum total arc cost and minimum time occupy.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of red blood cells disease using fuzzy logic theory","authors":"Ziad M. Abood, G. S. Karam, Rafied E. Hluot","doi":"10.1109/CRCSIT.2017.7965558","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965558","url":null,"abstract":"Blood cell classification is the initial process for detecting diseases; the diseases can be carried if it is detected at early stage. For solving such problems. Quantitative processing of digital images based on fuzzy technique is applied for classification of red blood cells. There are various features consist of shape, size and colour based features that based on statistical analysis (i.e. Mean, Standard Deviation, Variance, Roundness, Skewness, Kurtosis) have been extracted. The classification results indicated that these features highly signification and can be used for classification of red cells to the normal and up normal cells. The obtained result successfully identified 98% of red blood cells.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic text mining based on clustering and coreference resolution","authors":"S. Mahmood, Faiez Musa Lahmood Al-Rufaye","doi":"10.1109/CRCSIT.2017.7965549","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965549","url":null,"abstract":"Text mining discover and extract useful information from documents, whenever increase the size and number documents leads to redouble features. The huge features for the documents adds challenge to text mining called high dimension. The aim of this proposed study is minimize the high dimension of the documents, and improve Arabic text mining using clustering. In order to achieve this goal, we propose to applied coreference resolution technique using the clustering algorithms k-mediods and k-means. This study uses the similarity metrics Euclidean and Cosine. The system implements using a corpus contains on 200 sport news Arabic. Finally, evaluation measures are used including (Precision' Recall and F-measure) to evaluate our system.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amir Torab-Miandoab, Peyman Rezaei-Hachesu, T. Samad, Sogand Habibi-chenaran
{"title":"Image processing technique for determining cold thyroid nodules","authors":"Amir Torab-Miandoab, Peyman Rezaei-Hachesu, T. Samad, Sogand Habibi-chenaran","doi":"10.1109/CRCSIT.2017.7965547","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965547","url":null,"abstract":"Image processing is a technique that can be applied on medical images for detecting abnormalities such as tumors. Due to risk of malignancy, detecting and diagnosing of cold nodules in thyroid gland are important. We applied Image Enhancement (circular averaging filter, morphological opening by diamond structure element, division of results, transforming colorful image in to gray image), Image segmentation (thresholding) and feature extraction (hill climbing algorithm) to determine cold thyroid nodules automatically with high accuracy.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human voice extracted biometric features: What can be used for","authors":"S. Sadkhan, Baheeja K. Al-Shukur, Ali K. Mattar","doi":"10.1109/CRCSIT.2017.7965543","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965543","url":null,"abstract":"Strength of encryption algorithm is based on statistical performance of the bits key stream. Generate high quality key stream is a difficult task, which decides the level of security provided by the encryption algorithm. This paper propose two main directions to deal with the biometric features of human voice: first it focuses on how to extract good features that lead to produce encryption keys of lengths 128, 196, and 256 bits that have randomness characteristics, and secondly: how to generate a new encryption keys (18 new key each of 108-bits), only from 12 biometric voice features through a proposed random numbers generator. Statistical performance was performed to make sure that the random key sequence, which was generated in this paper have noise like characteristics to prove the importance of the features that were extracted from the signal of human voice, and how to deal with it. All keys that were used, passed successfully the randomness NIST tests (National Institute of Standards and Technology).","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dijkstra algorithm applied: Design and implementation of a framework to find nearest hotels and booking systems in Iraqi","authors":"A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed","doi":"10.1109/CRCSIT.2017.7965546","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965546","url":null,"abstract":"This paper was primarily conducted to develop an Online Booking System where users can search for different varieties of hotels and are able to sort them according to their price, number of stars or their location distance to any particular place in the city. Once the hotel is selected, Users are able to guess the fastest routes to all the tourist attraction places and restaurants nearby each hotel using Dijkstra algorithm. The system is more designed to help Iraqi tourists to prior explore and reserve rooms during peak times, Therefore, one if the main goal of the system is to adopt a payment agent that fits situation. This is because banking systems is not as efficient as it supposed to be. Hence, users are able to do the payment process through Visa cards or through their cell phones using payment services providers like Asia hawala or Zain Cash. Agile methodology, as one of the software engineering models has been used to design and implement this approach.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive study of spectrum sensing techniques in cognitive radio networks","authors":"Ahmed M. Jasim, Haidar N. Al-Anbagi","doi":"10.1109/CRCSIT.2017.7965542","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965542","url":null,"abstract":"Frequency spectrum scarcity has been a strong research motivation. Those researches have focused on developing methodologies to utilize frequency spectrum as much as it could be. Meanwhile, this spectrum utilization and its great revenue should not affect the quality of services being provided by network providers. In most cases, statistics have shown that only quarter of the spectrum is well utilized. Therefore, regulated authorities, which are in charge of organizing the access to the frequency spectrum, have proposed a strategy to share the already allocated spectrum band with the unlicensed users based on the appearance, or not, of the licensed users. This concept of vertical spectrum sharing is called cognitive radio (CR). Spectrum scarcity, dynamic spectrum access, and the cognitive radio networks (CRNs) are comprehensively investigated in this study. Furthermore, this study deeply examines the spectrum sensing of cognitive radio network providing an idea of this important technology and the challenges it may face.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117091342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing 3D-playfair algorithm to support all the existing characters and increase the resistanceto brute force and frequency analysis attacks","authors":"A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed","doi":"10.1109/CRCSIT.2017.7965538","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965538","url":null,"abstract":"Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's living languages. This is achieved by using four matrices of 128×128 to store all the possible characters which are 65536. As a result, the proposed algorithm has more resistanceto brute force andfrequency analysis attacks.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}