2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)最新文献

筛选
英文 中文
Distance estimation and vehicle position detection based on monocular camera 基于单目摄像机的距离估计与车辆位置检测
A. Ali, H. A. Hussein
{"title":"Distance estimation and vehicle position detection based on monocular camera","authors":"A. Ali, H. A. Hussein","doi":"10.1109/AIC-MITCSA.2016.7759904","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759904","url":null,"abstract":"This paper describes systematically two methods used in intelligent transportation systems: Distance Estimation using an onboard camera and car position detection. Distance estimation is a method for detecting distance for the preceding vehicles based on monocular camera. Vehicle position detection is a method of specifying the vehicle position relative to the road that can serve as Lane Departure Warning system. These two approaches have been discussed and implemented in this article. For lane detection and tracking, Hough Transform and Kalman filter were adopted. A brief introduction about both lane detection system and object detection is given. Finally, both approaches have been evaluated on a large dataset of videos.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Morphological gradient in brain magnetic resonance imaging based on intuitionistic fuzzy approach 基于直觉模糊方法的脑磁共振成像形态学梯度
Mohammed Y. Kamil
{"title":"Morphological gradient in brain magnetic resonance imaging based on intuitionistic fuzzy approach","authors":"Mohammed Y. Kamil","doi":"10.1109/AIC-MITCSA.2016.7759924","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759924","url":null,"abstract":"The morphological operations commonly used image gradient for gray level images in medical images. Medical images are usually poorly illuminated and several edges are not visible accurately. This paper have used the morphological gradient (erosion-dilation computation) of the fuzzy mathematical morphology based on Hamacher t-norm and t-conorm, and comparison with classical morphological gradient. The results of evaluation shown clearly of the effectiveness of the fuzzy morphological approach in brain magnetic resonance imaging compared to classical morphological based on statistical image quality.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design optimization of solar power system with respect to temperature and sun tracking 考虑温度和太阳跟踪的太阳能发电系统优化设计
A. Ali, Sameer S. Mustafa, Ali Hilal Mutlag
{"title":"Design optimization of solar power system with respect to temperature and sun tracking","authors":"A. Ali, Sameer S. Mustafa, Ali Hilal Mutlag","doi":"10.1109/AIC-MITCSA.2016.7759956","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759956","url":null,"abstract":"Solar panels work best in certain weather conditions, but the weather is changing always, so most panels do not operate under ideal conditions. Design optimization of photovoltaic (PV) modules with changing in the environmental parameters, such as solar irradiance and temperature is presented in this work for Kirkuk city based on HOMER software. Our system consists of series-parallel combination of solar PV panels, maximum power point tracking controller (MPPT), batteries and converter. Four case studies using different types of sun tracking systems considering temperature effects were presented. The optimum system design which has the minimum cost of energy (COE) and total net present cost (NPC) was achieved when we adopt two-axis tracking system. Both NPC and COE were found inversely proportion with temperature coefficient of power, and direct proportion with operating cell temperature.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127270094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A novel technique of privacy preserving association rule mining 一种新的保护隐私的关联规则挖掘技术
R. S. Mohammed, Enas Mohammed Hussien, Jinan Redha Mutter
{"title":"A novel technique of privacy preserving association rule mining","authors":"R. S. Mohammed, Enas Mohammed Hussien, Jinan Redha Mutter","doi":"10.1109/AIC-MITCSA.2016.7759930","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759930","url":null,"abstract":"Privacy Preserving Association Rule Mining (PPAM) becomes an important issue in recent years. Since data mining alone is not enough to share data between companies without privacy preserving. In this paper, a new technique has been proposed to maintain the confidentiality of the data by fabricating of association rule using a stochastic standard map without returning to mining sensitive data again. The system simulation using Matlab and tested that shows the successful difference between the original data and fabricated. And also been achieved high speed and fewer memory requirements.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image encryption based on linear feedback shift register method 基于线性反馈移位寄存器的图像加密方法
S. T. Allawi, J. H. Al-A’meri
{"title":"Image encryption based on linear feedback shift register method","authors":"S. T. Allawi, J. H. Al-A’meri","doi":"10.1109/AIC-MITCSA.2016.7759903","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759903","url":null,"abstract":"A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column in the resulting image of the first encryption process. The experimental results show that the new proposed method is efficient and has high security features.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image encryption technique using clustering and stochastic standard map 基于聚类和随机标准映射的图像加密技术
R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif
{"title":"Image encryption technique using clustering and stochastic standard map","authors":"R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif","doi":"10.1109/AIC-MITCSA.2016.7759931","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759931","url":null,"abstract":"In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of swimming robot based on Carp fish biomimetic 基于鲤鱼仿生的游泳机器人设计与实现
A. I. Majeed, A. Ali
{"title":"Design and implementation of swimming robot based on Carp fish biomimetic","authors":"A. I. Majeed, A. Ali","doi":"10.1109/AIC-MITCSA.2016.7759912","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759912","url":null,"abstract":"This paper introduces a complete plan for design and implementation of a biomimetic robotic fish. The robot design is physically based on a model of a Carp fish. The designed robot has a rigid anterior body part, flexible posterior body part and a flexible caudal fin. The flexible posterior body part is consists of four links and are driven by four servomotors in addition to a fifth one for controlling the robot pitch angle through changing the centre of gravity position. The designed robot was also equipped with diving system which consists of a water pump and an internal tank. The fish locomotion control is divided into speed, orientation, diving and transient motion control. The swimming of the robotic fish was relied on the so called behavioural based control system that makes use of a sensor fusion algorithm. The innovative design of the robotic fish combines the two schemes of the underwater vehicles or robots control in that it can swim autonomously or remotely controlled by a personal computer via WiFi link. The experimental results of the designed robotic fish show the excellent feasibility and high performance of the proposed design.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and fabrication of new diamond patch antenna for wireless communications 新型无线通信金刚石贴片天线的设计与制造
R. H. Thaher, Saif Nadhim Alsaidy
{"title":"Design and fabrication of new diamond patch antenna for wireless communications","authors":"R. H. Thaher, Saif Nadhim Alsaidy","doi":"10.1109/AIC-MITCSA.2016.7759902","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759902","url":null,"abstract":"The present work investigates the operation performance of a new shape diamond patch microstrip antenna. The proposed diamond antenna covers the bandwidth from 2.3GHz to 18.5GHz that meets the essential requirements of wide band communications applications, and gives gain ranging from -2.6dBi to 5.3dBi. Three slots are of two T-shapes and one S-shape added to diamond patch to improve the gain, therefore the gain becomes in the range from 0dBi to 8dBi. This antenna is fabricated and tested practically and found good agreement between the simulation and measured results.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Texture image segmentation based on classification of contour elements and logical addition of classes 基于轮廓元素分类和类的逻辑添加的纹理图像分割
H. Alzakki, V. Tsviatkou
{"title":"Texture image segmentation based on classification of contour elements and logical addition of classes","authors":"H. Alzakki, V. Tsviatkou","doi":"10.1109/AIC-MITCSA.2016.7759922","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759922","url":null,"abstract":"A method for texture images segmentation based on classification of contour elements and logical addition of classes. The essence of the method consists in the contouring of the image, determining the position of contour elements in the image of different types (points, lines, and shapes) converting closely spaced similar contour elements into binary regions objects, binary coding mutual position obtained areal objects within the boundaries of the image segmentation are resulting in code matrix.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fractal coding technique based on different block size 基于不同块大小的分形编码技术
Nahla Abdul Jalil Salih
{"title":"Fractal coding technique based on different block size","authors":"Nahla Abdul Jalil Salih","doi":"10.1109/AIC-MITCSA.2016.7759953","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759953","url":null,"abstract":"The proposed technique presents adaptive new method used to decrease the encoding time in “fractal coding algorithms”. This technique reduces the “number of transforms” used to each domain block. So, the time required for the comparison between one “range block and domain blocks” is decreased. In this technique we partitioned the image depending on the Variance Criteria. Different block sizes ranging (4-16) have been used. The results show that the number of partitions (blocks), produced by quadtree partition, depends strongly on the adopted partitioning parameters (i.e. the Standard deviation, Mean, Minimum, and Maximum block size). The selection of small values of Mean(0.1-0.4) and Standard deviation (0.5-3) had reconstructed high image quality and low compression ratio,(e.g. we get PSNR =34.8dB and CR=4.89 E.T=18s) and vice versa.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信