{"title":"Mathematical Modeling of Information Warfare - Status, Challenges and Future Trends","authors":"Ali AL-Faluji, S. Sadkhan","doi":"10.1109/ACA52198.2021.9626786","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626786","url":null,"abstract":"Information warfare is a new threat that has the potential to become a major global security problem in the future, particularly if the relationship between information and power strengthens. Information warfare will emerge as a national security threat in the next years, according to futures projections. The four scenarios examined provide plausible outcomes that provide early warning indicators of how knowledge warfare will emerge as a national security threat. Polarization is a big future issue in terms of utilizing conflict as a weapon of mass disruption. This paper will provide the status, challenges facing this important type of new warfare, and also concentrates on the future trends facing this important type of warfare","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatial Domain Block Based Blind Image Watermarking for Hardware Applications","authors":"Noor Mohammed Abdulwahab, N. M. Basheer","doi":"10.1109/ACA52198.2021.9626800","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626800","url":null,"abstract":"Internet revolution led to a vast growth in multimedia applications. So, it has turned to be a common practice to copy, transmit and distribute digital data and this, in turn, resulted in using the resources of data illegally and users who are not authorized hack by using such applications.Digital watermarking is regarded as one of the proposed solutions, which is suggested for copyright protection. This research accentuates the digital image watermarking, which protects the image by means of hiding a watermark image in an original image to demonstrate legal ownership.This paper suggests a new method of embedding and retrieving a watermark image besides the works within the (spatial domain) of digital images in which an invisible watermark image is embedded. By using a secret key to encrypt the watermark image for the sake of more security and implementing the block based spatial watermarking method embeds to the watermark to achieve a good robustness against many attacks. MATLAB has been used to perform and implement this work.”","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hyper-chaotic system and adaptive substitution box (S-Box) for image encryption","authors":"Omar A. Jasim, Khalid F. A. Hussein","doi":"10.1109/ACA52198.2021.9626793","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626793","url":null,"abstract":"the inclusion of chaos to encrypt multimedia information has been a remarkable feature of nonlinear dynamics for the last three decades. A hyper-chaotic system and a Substitution S-Box for image encryption are included in this article. Substitution is built by adapting the Rijndael S-Box into one dimension to minimize converting between digital systems using the same safety key for safe communication during the encryption process. This concept of chaos-based encryption and substitution box provides comparatively enhanced results by better CPU encryption time for images colored 256x256 to 0.2485 seconds, and 512x512 to 0.3665 seconds. According to the results of the testing, the proposed image encryption algorithm is highly safe, resistant against image processing attacks, and fast for the image encryption application as depicted in security analysis.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of High Gain SEPIC Converter","authors":"Ihsan Ahmed, Turki Kahawish","doi":"10.1109/ACA52198.2021.9626787","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626787","url":null,"abstract":"The study’s purpose is to design a novel high voltage gain single ended primary inductor converter (SEPIC) that is suitable for photovoltaic energy. A split inductor circuit and an expanded switched capacitor circuit have been combined with a modified SEPIC converter to create this topology. A high gain voltage with low value of duty ratio is the main advantage of the implemented topology. By mixing the split inductor circuit (three diodes and two inductors) and the switched capacitor circuit (two diodes and two capacitors) with the modified SEPIC converter, the output voltage gain is increased to 7.5 with a duty ratio value of 0.5. The steady state study and the principle of operation of the presented DC-DC SEPIC converter are produced in continuous conduction mode (CCM). The theoretical analysis and the performance of the designed SEPIC converter is verified by MATLAB program and practical outcomes.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble-based Noise Filter for Noisy and Imbalanced Data","authors":"Akram M. Radwan","doi":"10.1109/ACA52198.2021.9626798","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626798","url":null,"abstract":"Class Imbalance problems have an unequal distribution of classes within a dataset. The noise filter is a preprocessing technique that aims to identify and delete noisy examples in the training data to improve the performance of an induced classifier. In our previous work, we proposed a novel method deletes noisy examples, located inside the borderline region, from the majority class. The method combines the advantages of thresholding with noise filtering. In that method, the identification of noise is based on classification filter approach. One of the main drawbacks of this approach is that classifiers are organized in parallel way so they cannot benefit each other through noise identification. In this paper, we evaluate our proposed method by investigating the use of ensemble filter approach to identify noisy examples. The extended method has been assessed on 14 real imbalanced datasets. The results show that our proposal is significant in identifying noise and performs better in term of AUC scores based on random forest.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Features Extraction and Recognition based on the Local Binary Pattern Technique","authors":"M. Taha, H. M. Ahmed","doi":"10.1109/ACA52198.2021.9626827","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626827","url":null,"abstract":"The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with the fixed-distance user cooperation. However, for the colour eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Local Binary Pattern (LBP) to retrieve the iris’s characteristics in both NIR iris images and visible spectrum. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a colour image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (86%) on UBIRIS v1 evaluated by comparing to the other methods.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Next Generation Mobile Broadcasting BICM Module to Improve T2-Lite System Robustness","authors":"H. S. Ghayyib, S. J. Mohammed","doi":"10.1109/ACA52198.2021.9626794","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626794","url":null,"abstract":"Digital Video Broadcasting Next Generation Handheld (DVB-NGH) is the next-generation mobile TV broadcasting technology, which the DVB Project has developed. It’s the mobile extension of the high-performance Digital Video Broadcasting Terrestrial Second Generation (DVB-T2), with the most superior transmission technologies. One of the main modifications introduced by DVB-NGH is the advanced module of Bit-interleaved coded and modulation (BICM) based on a subset of DVB-T2 BICM elements. The diversity benefit gained by the modern features included in the DVB-NGH BICM module is examined in this study. This module incorporates two kinds of rotation schemes according to the specified coding rate: two-dimensional and four-dimensional rotated constellations (2D, 4D-RC). A comparison has been made between the acquired gain and the case of using the T2-Lite system’s fundamental BICM module, including the rotated constellations method. To confirm the efficiency of the created module, simulation results were done in MATLAB version R2020b using two fading channels: Rayleigh and 0 dB Echo. Finally, the acquired findings show a significant increase in system robustness when using the DVB-NGH BICM instead of the fundamental T2-Lite BICM module.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sub-Array Hybrid Beamforming for Sustainable Largescale mmWave-MIMO Communications","authors":"I. Hburi, H. Khazaal, Russel Fahdel, Haider Raadi","doi":"10.1109/ACA52198.2021.9626806","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626806","url":null,"abstract":"Hybrid beamforming has recently received substantial attention as a substitute to fully digital beamforming. The current hybrid beamforming structures can be categorized into two classes: fully-connected and sub-connected phase shifters. The former type includes a large number of phase shifters which results in an excessive energy consuming, while the later arrangement endures a serious spectral performance loss although of low energy consuming. This paper considers a low complexity algorithm to fulfill a sub-connected hybrid-BF which leverages an iterative optimization algorithm matrix vectorization property to update the baseband-BF and leverages the property of the feasible set for the passband-BF to drop the unit-modulus limits from the optimization task, and hence transform the matrix-problem into a simpler phase-rotated vector-problem to update the passband-BF. In addition, the initial beamforming vectors for the iterative process, i.e., the algorithm starting point, is determined from the optimal fully digital-BF according to the lest square error approach which assist in improving the convergence speed of the algorithm. We investigate the effects of different scheme parameters on the performance, which offer good insights for HP systems. The numerical results demonstrate the superior performance of the suggested designs compared to the some of the benchmark reference approaches. The simulation results show that the spectral efficiency of this algorithm is at least 54% higher than the traditional fully-analog algorithms at 5 dB SNR. Additionally, it increases energy efficiency by at least 36% compared with the orthogonal matching pursuit algorithm for number of RF-chain of 18.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematics and Security","authors":"","doi":"10.1109/aca52198.2021.9626812","DOIUrl":"https://doi.org/10.1109/aca52198.2021.9626812","url":null,"abstract":"","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}