Iraqi Journal for Computers and Informatics最新文献

筛选
英文 中文
A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT 雾计算环境中数据流的研究
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-08 DOI: 10.25195/2017/4515
Shymaa Mohammed Jameel, Muayad Sadik Croock
{"title":"A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT","authors":"Shymaa Mohammed Jameel, Muayad Sadik Croock","doi":"10.25195/2017/4515","DOIUrl":"https://doi.org/10.25195/2017/4515","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47732013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEDICAL IMAGES COMPRESSION BASED ON SPIHT AND BAT INSPIRED ALGORITHMS 基于SPIHT和BAT算法的医学图像压缩
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-08 DOI: 10.25195/2017/4511
Sarah Saadoon Jasim
{"title":"MEDICAL IMAGES COMPRESSION BASED ON SPIHT AND BAT INSPIRED ALGORITHMS","authors":"Sarah Saadoon Jasim","doi":"10.25195/2017/4511","DOIUrl":"https://doi.org/10.25195/2017/4511","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42645999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TEXT CLASSIFICATION BASED ON FUZZY RADIAL BASIS FUNCTION 基于模糊径向基函数的文本分类
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-08 DOI: 10.25195/2017/4513
Zuhair Hussein Ali, Ameen A. Noor
{"title":"TEXT CLASSIFICATION BASED ON FUZZY RADIAL BASIS FUNCTION","authors":"Zuhair Hussein Ali, Ameen A. Noor","doi":"10.25195/2017/4513","DOIUrl":"https://doi.org/10.25195/2017/4513","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42688621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER 用于身份和访问管理的智能认证&综述
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-08 DOI: 10.25195/2017/4512
Alia Karim Abdul-Hassan, Iman Hasson Hadi
{"title":"INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER","authors":"Alia Karim Abdul-Hassan, Iman Hasson Hadi","doi":"10.25195/2017/4512","DOIUrl":"https://doi.org/10.25195/2017/4512","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41918947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ROBOTIC MOTION PLANNING USING CONVEX OPTIMIZATION METHODS 机器人运动规划的凸优化方法
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-01 DOI: 10.25195/20174524
T. Nayl
{"title":"ROBOTIC MOTION PLANNING USING CONVEX OPTIMIZATION METHODS","authors":"T. Nayl","doi":"10.25195/20174524","DOIUrl":"https://doi.org/10.25195/20174524","url":null,"abstract":"Collision avoidance techniques tend to derive the robot away of the obstacles in minimal total travel distance. Most ofthe collision avoidance algorithms have trouble get stuck in a local minimum. A new technique is to avoid local minimum in convexoptimization-based path planning. Obstacle avoidance problem is considered as a convex optimization problem under system state andcontrol constraints. The idea is by considering the obstacles as a convex set of points which represents the obstacle that encloses inminimum volume ellipsoid, also the addition of the necessary offset distance and the modified motion path is presented. In the analysis,the results demonstrated the effectiveness of the suggested motion planning by using the convex optimization technique.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46076039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BUILD CRYPTOGRAPHIC SYSTEM FROM MULTI-BIOMETRICS USING MEERKAT ALGORITHM 利用猫鼬算法构建基于多生物特征的密码系统
Iraqi Journal for Computers and Informatics Pub Date : 2019-12-01 DOI: 10.25195/20174521
Duha Salman, R. A. Azeez, Abdul Abdul-hossen
{"title":"BUILD CRYPTOGRAPHIC SYSTEM FROM MULTI-BIOMETRICS USING MEERKAT ALGORITHM","authors":"Duha Salman, R. A. Azeez, Abdul Abdul-hossen","doi":"10.25195/20174521","DOIUrl":"https://doi.org/10.25195/20174521","url":null,"abstract":"Presenting uncouth proposal for the design of investigating ways to use extraction feature from biometric user,rather than memorable password or passphrase as an attempt to produce a new and randomly cipher keys. Human users find itdifficult to remember long cipher keys. Therefore, the proposed work takes the eye and ear as a multi-biometrics feature extraction forgenerating the cryptography keys. Meerkat Clan Key Generation Algorithm (MCKGA) is used in this work for key generation, firstlywe generate keys with 128-bits, then we enhance our method by generating 256-bits, and finally we mix the keys produced from (eyeand ear) and get robust key with 512-bits length, these keys are tested by NIST statically test to generate random keys used in encryptionprocess. Our approach generates unique keys used in cryptographic system by using Advanced Encryption Standard (AES) algorithm.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43686483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT 雾计算环境下的数据流研究
Iraqi Journal for Computers and Informatics Pub Date : 2019-05-01 DOI: 10.25195/IJCI.V45I1.42
Shymaa Mohammed Jameel, Baghdad Iraq Informatics, M. Croock
{"title":"A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT","authors":"Shymaa Mohammed Jameel, Baghdad Iraq Informatics, M. Croock","doi":"10.25195/IJCI.V45I1.42","DOIUrl":"https://doi.org/10.25195/IJCI.V45I1.42","url":null,"abstract":"In lately years, data streaming is become more important day by day, considering technologies employed to servethat manner and share number of terminals within the system either direct or indirect interacting with them.Smart devices now play active role in the data streaming environment as well as fog and cloud compatibility. It is affectingthe data collectivity and appears clearly with the new technologies provided and the increase for the number of theusers of such systems. This is due to the number of the users and resources available system start to employ the computationalpower to the fog for moving the computational power to the network edge. It is adopted to connect system that streamed dataas an object. Those inter-connected objects are expected to be producing more significant data streams, which are produced atunique rates, in some cases for being analyzed nearly in real time. In the presented paper a survey of data streaming systemstechnologies is introduced. It clarified the main notions behind big data stream concepts as well as fog computing. From thepresented study, the industrial and research communities are capable of gaining information about requirements for creatingFog computing environment with a clearer view about managing resources in the Fog.The main objective of this paper is to provide short brief and information about Data Streaming in Fog ComputingEnvironment with explaining the major research field within this meaning.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42581574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER 用于身份和访问管理的智能认证:综述论文
Iraqi Journal for Computers and Informatics Pub Date : 2019-05-01 DOI: 10.25195/IJCI.V45I1.39
I. Hadi
{"title":"INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER","authors":"I. Hadi","doi":"10.25195/IJCI.V45I1.39","DOIUrl":"https://doi.org/10.25195/IJCI.V45I1.39","url":null,"abstract":"Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43064764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COLOR FEATURE WITH SPATIAL INFORMATION EXTRACTION METHODS FOR CBIR: A REVIEW 彩色特征空间信息提取方法综述
Iraqi Journal for Computers and Informatics Pub Date : 2019-05-01 DOI: 10.25195/ijci.v45i1.45
Sarmad T. Abdul-Samad
{"title":"COLOR FEATURE WITH SPATIAL INFORMATION EXTRACTION METHODS FOR CBIR: A REVIEW","authors":"Sarmad T. Abdul-Samad","doi":"10.25195/ijci.v45i1.45","DOIUrl":"https://doi.org/10.25195/ijci.v45i1.45","url":null,"abstract":"Inn then last two decades the Content Based Image Retrieval (CBIR) considered as one of the topic of interest for theresearchers. It depending one analysis of the image’s visual content which can be done by extracting the color, texture and shapefeatures. Therefore, feature extraction is one of the important steps in CBIR system for representing the image completely. Color featureis the most widely used and more reliable feature among the image visual features. This paper reviews different methods, namely LocalColor Histogram, Color Correlogram, Row sum and Column sum and Colors Coherences Vectors were used to extract colors featurestaking in consideration the spatial information of the image.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45400749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TEXT CLASSIFICATION BASED ON FUZZY RADIAL BASIS FUNCTION 基于模糊径向基函数的文本分类
Iraqi Journal for Computers and Informatics Pub Date : 2019-05-01 DOI: 10.25195/IJCI.V45I1.40
Z. Ali, Ameen A. Noor
{"title":"TEXT CLASSIFICATION BASED ON FUZZY RADIAL BASIS FUNCTION","authors":"Z. Ali, Ameen A. Noor","doi":"10.25195/IJCI.V45I1.40","DOIUrl":"https://doi.org/10.25195/IJCI.V45I1.40","url":null,"abstract":"Automated classification of text into predefined categories has always been considered as a vital method in thenatural language processing field. In this paper new methods based on Radial Basis Function (RBF) and Fuzzy Radial BasisFunction (FRBF) are used to solve the problem of text classification, where a set of features extracted for each sentencein the document collection these set of features introduced to FRBF and RBF to classify documents. Reuters 21578 datasetutilized for the purpose of text classification. The results showed the effectiveness of FRBF is better than RBF.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信