Iraqi Journal for Computers and Informatics最新文献

筛选
英文 中文
FEATURE-BASED FACE DETECTION: A SURVEY 基于特征的人脸检测研究
Iraqi Journal for Computers and Informatics Pub Date : 2018-12-31 DOI: 10.25195/2017/4426
Tanya abdul-sattar jabor
{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Tanya abdul-sattar jabor","doi":"10.25195/2017/4426","DOIUrl":"https://doi.org/10.25195/2017/4426","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69282036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SUGGESTED SUPER SALSA STREAM CIPHER 一种建议的超SALSA流密码
Iraqi Journal for Computers and Informatics Pub Date : 2018-12-31 DOI: 10.25195/ijci.v44i2.51
M. S. Mahdi, N. Hassan
{"title":"A SUGGESTED SUPER SALSA STREAM CIPHER","authors":"M. S. Mahdi, N. Hassan","doi":"10.25195/ijci.v44i2.51","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.51","url":null,"abstract":"Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. Thegenerated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomlykeystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity andspeed for Salsa (8, 12 and 20).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45879263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
FEATURE-BASED FACE DETECTION: A SURVEY 基于特征的人脸检测研究综述
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.109
Abbas Albakri, S. Al-Mamory, Hadeel H. Alfartosy
{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Abbas Albakri, S. Al-Mamory, Hadeel H. Alfartosy","doi":"10.25195/ijci.v44i1.109","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.109","url":null,"abstract":"Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43351223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATIC IRAQI CARS NUMBER PLATES EXTRACTION 伊拉克汽车号牌自动提取
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.111
Safaa S. Omran, Jumana A. Jarallah
{"title":"AUTOMATIC IRAQI CARS NUMBER PLATES EXTRACTION","authors":"Safaa S. Omran, Jumana A. Jarallah","doi":"10.25195/ijci.v44i1.111","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.111","url":null,"abstract":"License Plate Recognition (LPR) system becomes animportant research issue in recent years due to its importance to wideranges of commercial applications. The first and the most importantstage for any LPR system is the localization of the number platewithin the vehicle image. This paper presents a methodology for Iraqicars number plates extraction from the vehicle image using twomethods, the first one is morphological operations and the secondmethod is edge detection. The main idea is to use these two differentmethods in such away so that the number plate of the vehicle can beextracted precisely. These algorithms can quickly and correctly detectand extract the number plate from the vehicle image although therewas a little noise in the image. This paper also makes a comparisonbetween the two methods of extraction in results. The software thatused to build the systems is MATLAB R2014a","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41509228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PROPOSED APPROACH FOR IMPROVING RNA CRYPTO-KEY BASED ON POLYNOMIAL CONVOLUTION 提出了一种基于多项式卷积改进RNA加密密钥的方法
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.65
Estabraq Abdulredaa Kadhim
{"title":"PROPOSED APPROACH FOR IMPROVING RNA CRYPTO-KEY BASED ON POLYNOMIAL CONVOLUTION","authors":"Estabraq Abdulredaa Kadhim","doi":"10.25195/ijci.v44i1.65","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.65","url":null,"abstract":"Random Number Generators are fundamental toolsfor cryptography protocols and algorithms. The basic problems thatface any crypto key generator are randomness, correlations anddistribution of the state of key sequence. This paper proposed a newmethod to enhance RNA crypto key generation. It has beenimplemented by extending the crypto key by applying polynomialconvolution technique which extracts the mask filter from the sameRNA key sequence depending on the start and end codon properties.This will provide another high level of extension and generaterandom-strength crypto key. The proposal approach could passthrough the statistical measurements successfully and achieved highrate of randomness (approximated to 96%).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A RADIAL BASIS NEURAL NETWORK CONTROLLER TO SOLVE CONGESTION IN WIRELESS SENSOR NETWORKS 一种解决无线传感器网络拥塞的径向基神经网络控制器
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-01 DOI: 10.25195/2017/4419
M. Hussain
{"title":"A RADIAL BASIS NEURAL NETWORK CONTROLLER TO SOLVE CONGESTION IN WIRELESS SENSOR NETWORKS","authors":"M. Hussain","doi":"10.25195/2017/4419","DOIUrl":"https://doi.org/10.25195/2017/4419","url":null,"abstract":"In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most importantissues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routingin wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within anexact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayerperceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller(RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate trafficcongestion along the selected route. A comparison study between the network with and without controller in terms of: trafficreceived to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of RadialBasis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44718667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DESIGN AND IMPLEMENT CHAT PROGRAM USING TCP/IP 基于TCP/IP的聊天程序的设计与实现
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-01 DOI: 10.25195/2017/4417
Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah
{"title":"DESIGN AND IMPLEMENT CHAT PROGRAM USING TCP/IP","authors":"Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah","doi":"10.25195/2017/4417","DOIUrl":"https://doi.org/10.25195/2017/4417","url":null,"abstract":"LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of acompany. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposedprotocol facilitates information exchange among individuals by providing many communication options. It is a standaloneapplication using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT Lt10是一种轻量级的物联网加密算法
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-01 DOI: 10.25195/2017/4411
Hiba Taresh
{"title":"LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT","authors":"Hiba Taresh","doi":"10.25195/2017/4411","DOIUrl":"https://doi.org/10.25195/2017/4411","url":null,"abstract":"In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41343571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution 一种基于多项式卷积的改进RNA密钥的方法
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-01 DOI: 10.25195/2017/4412
Estabraq Abdul Redaa Kadhim
{"title":"Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution","authors":"Estabraq Abdul Redaa Kadhim","doi":"10.25195/2017/4412","DOIUrl":"https://doi.org/10.25195/2017/4412","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43505091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM 基于小波包变换的高频语音图像隐藏
Iraqi Journal for Computers and Informatics Pub Date : 2018-06-01 DOI: 10.25195/2017/4418
M. Al-Turfi
{"title":"IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM","authors":"M. Al-Turfi","doi":"10.25195/2017/4418","DOIUrl":"https://doi.org/10.25195/2017/4418","url":null,"abstract":"This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequencycomponents of the speech signal with the data of the image where the high frequency speech components are separated and analyzed usingthe Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43542308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信