Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075795
Dheargham Ali Abdulsada, L. Al-Swidi
In the present study, the centre set theory have been employed to define the new class of topological space. The dense and nowhere dense were defined via the centre topological space. Also, we were given some properties and relationship between them.
{"title":"Some Properties of $mathcal{C}$-Topological Space","authors":"Dheargham Ali Abdulsada, L. Al-Swidi","doi":"10.1109/CAS47993.2019.9075795","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075795","url":null,"abstract":"In the present study, the centre set theory have been employed to define the new class of topological space. The dense and nowhere dense were defined via the centre topological space. Also, we were given some properties and relationship between them.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132475091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075645
A. Al-haddad, A. A. Abdul hadi
In this research, the impact of magnetic field peristaltic transport and Brownian movement of Jeffery nanofluid in a tapered symmetric channel is examined under the hypotheses of long wave length and low Reynolds number. The nondimensional nonlinear momentum and concentration equations numerically are solved. Graphically results are utilised to show the force of several coefficients against the axial velocity, temperature profile, and concentration of nanoparticle. The results were compared with other research.
{"title":"Influence of Peristaltic Flow And Brownian Motion Of Jeffery Nanofluid In A Tapered Asymmetric Channel","authors":"A. Al-haddad, A. A. Abdul hadi","doi":"10.1109/CAS47993.2019.9075645","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075645","url":null,"abstract":"In this research, the impact of magnetic field peristaltic transport and Brownian movement of Jeffery nanofluid in a tapered symmetric channel is examined under the hypotheses of long wave length and low Reynolds number. The nondimensional nonlinear momentum and concentration equations numerically are solved. Graphically results are utilised to show the force of several coefficients against the axial velocity, temperature profile, and concentration of nanoparticle. The results were compared with other research.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075462
Huda Alwan Jasim, Eidan Abdallah Asi, M. I. Malik, Sattar Abdalhussian Shahatha
This paper shows the synchronization in multi-scroll Chua's circuit, designing and building it. The generating of multi-scroll attractors take place by doubling the breakpoints of Chua's circuit; this requires a formula for determining and calculating these breakpoints voltages and value of nonlinear resistors. We observed that theoretical calculation, computer simulations and experimental results, they all corresponding. We get some of the important concepts, first: increasing the number of nonlinear resistors lead to more breakpoints, and the last leads to more scrolls that have the same size. 2nd: The higher the number of scrolls, the better in applications.
{"title":"Designing and building 16 scrolls attractor of Chua's Circuit and making Sync among them","authors":"Huda Alwan Jasim, Eidan Abdallah Asi, M. I. Malik, Sattar Abdalhussian Shahatha","doi":"10.1109/CAS47993.2019.9075462","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075462","url":null,"abstract":"This paper shows the synchronization in multi-scroll Chua's circuit, designing and building it. The generating of multi-scroll attractors take place by doubling the breakpoints of Chua's circuit; this requires a formula for determining and calculating these breakpoints voltages and value of nonlinear resistors. We observed that theoretical calculation, computer simulations and experimental results, they all corresponding. We get some of the important concepts, first: increasing the number of nonlinear resistors lead to more breakpoints, and the last leads to more scrolls that have the same size. 2nd: The higher the number of scrolls, the better in applications.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"164 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134449367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075778
S. Sadkhan, Abbas A. Mahdi, R. S. Mohammed
The term Steganography refers to the science that deals with hiding the secret messages (text or anything else) inside an original cover file of the text, audio, video or image. The need for modern methods is to keep the secret information and protected it with the increasing danger of outside hackers. Steganography seems to be a good option to increase information security by hiding them. This paper is a review of the past year's methods used in audio steganography. Audio steganography is a method to hide a secret message (sound or anything else) in an audio cover file, in varied ways. It is a proposal for future actions. These methods used different types of digital audio such as WAV, MP3 or AU. The result showed that most of the studies used LSB to embed secret messages, but with other encryption-system for strength LSB family. Others Modified LSB to produce an enhanced method. In general, most studies concentrate on common methods or their combination to develop new efficient methods. Most of the studies had a lack in all or some measures of invisibility and robustness. This concept came after authors' interesting in cryptography more than steganography. This study recommended maintaining all measures to enable future studies to determine which steganography method is most effective.
{"title":"Recent Audio Steganography Trails and its Quality Measures","authors":"S. Sadkhan, Abbas A. Mahdi, R. S. Mohammed","doi":"10.1109/CAS47993.2019.9075778","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075778","url":null,"abstract":"The term Steganography refers to the science that deals with hiding the secret messages (text or anything else) inside an original cover file of the text, audio, video or image. The need for modern methods is to keep the secret information and protected it with the increasing danger of outside hackers. Steganography seems to be a good option to increase information security by hiding them. This paper is a review of the past year's methods used in audio steganography. Audio steganography is a method to hide a secret message (sound or anything else) in an audio cover file, in varied ways. It is a proposal for future actions. These methods used different types of digital audio such as WAV, MP3 or AU. The result showed that most of the studies used LSB to embed secret messages, but with other encryption-system for strength LSB family. Others Modified LSB to produce an enhanced method. In general, most studies concentrate on common methods or their combination to develop new efficient methods. Most of the studies had a lack in all or some measures of invisibility and robustness. This concept came after authors' interesting in cryptography more than steganography. This study recommended maintaining all measures to enable future studies to determine which steganography method is most effective.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128277692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075765
Selma Thabet Thaker, Amaal Sadeq Hamoodi
The research dealt with using (Poisson Regression Model) to estimate the recurrence rate of Bladder cancer over six months' period, after injurer's recovery. Since the dependent variable in this model represents the numerous of recurs tumor in the bladder, while the related explanatory variables associated with the recurrence of the tumor represented by heredity, smoking, chronic, inflammation, age and gender, which supposed to affected tumor recurrence. We have relied on (Generalized Linear models) which the Poisson regression model considered apart from it, in finding the model capabilities and developing its statistical reasoning.
{"title":"Estimation of the recurrence rate of Bladder Cancer Tumor","authors":"Selma Thabet Thaker, Amaal Sadeq Hamoodi","doi":"10.1109/CAS47993.2019.9075765","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075765","url":null,"abstract":"The research dealt with using (Poisson Regression Model) to estimate the recurrence rate of Bladder cancer over six months' period, after injurer's recovery. Since the dependent variable in this model represents the numerous of recurs tumor in the bladder, while the related explanatory variables associated with the recurrence of the tumor represented by heredity, smoking, chronic, inflammation, age and gender, which supposed to affected tumor recurrence. We have relied on (Generalized Linear models) which the Poisson regression model considered apart from it, in finding the model capabilities and developing its statistical reasoning.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075725
Estqlal Hammad Dhah, M. A. Naser, Suhad A. Ali
Filtering of spam image-based email remains a major challenge for researchers. This paper presents a proposed work which is based on several facts such that spam images containing a large percentage of text which has characteristics or features different from other types of images. In addition to that, there is much similarity between the features of these images. These facts can be used to distinguish text regions spam images from others. A hybrid method based on combined features vector from text regions and features of the image is proposed. Two types of features are extracted. The first features extraction method is the local binary pattern (LBP) with extricating the image texture features directly, while the second is utilised to extricate features of image text regions only. The extracted features are used in individual and combination style in order to learn classifiers at the training stage. A one-class KNN classifier and two-class KNN classifier are applied separately. Each classifier was used in three fashion, with the text-regions features, with texture features in the image, and with merging both those features respectively. Experimental results showed that the appropriation of both image and text features together improves the effectiveness of the classification concerning the case in which only image or text features are used.
{"title":"Spam Email Image Classification Based on Text and Image Features","authors":"Estqlal Hammad Dhah, M. A. Naser, Suhad A. Ali","doi":"10.1109/CAS47993.2019.9075725","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075725","url":null,"abstract":"Filtering of spam image-based email remains a major challenge for researchers. This paper presents a proposed work which is based on several facts such that spam images containing a large percentage of text which has characteristics or features different from other types of images. In addition to that, there is much similarity between the features of these images. These facts can be used to distinguish text regions spam images from others. A hybrid method based on combined features vector from text regions and features of the image is proposed. Two types of features are extracted. The first features extraction method is the local binary pattern (LBP) with extricating the image texture features directly, while the second is utilised to extricate features of image text regions only. The extracted features are used in individual and combination style in order to learn classifiers at the training stage. A one-class KNN classifier and two-class KNN classifier are applied separately. Each classifier was used in three fashion, with the text-regions features, with texture features in the image, and with merging both those features respectively. Experimental results showed that the appropriation of both image and text features together improves the effectiveness of the classification concerning the case in which only image or text features are used.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075491
Aseel abdul-karim Qasim, A. Sallomi
Smart antenna represents one of the promising technology in the Fourth Generation (4G) and other future cellular wireless communication systems due to its capabilities to provide high capacity and coverage with the use of the allocated RF spectrum. This paper discusses, the potential of Particle Swarm Optimization (PSO) algorithm in adaptive pattern synthesis of the linear antenna array systems. The validity of the PSO algorithm in distinguishing between the desired signal and interferers is tested through considering uniform and non-uniform spaced linear array. The PSO is used to optimise the interspace between array elements at which maximum directivity is achieved. The simulations confirmed that smart system performance improvement in term of directivity, sidelobe level reduction and HPBW could be achieved through the use of PSO algorithm.
{"title":"Optimisation of Adaptive Antenna Array Performance Using Particle Swarm Algorithm","authors":"Aseel abdul-karim Qasim, A. Sallomi","doi":"10.1109/CAS47993.2019.9075491","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075491","url":null,"abstract":"Smart antenna represents one of the promising technology in the Fourth Generation (4G) and other future cellular wireless communication systems due to its capabilities to provide high capacity and coverage with the use of the allocated RF spectrum. This paper discusses, the potential of Particle Swarm Optimization (PSO) algorithm in adaptive pattern synthesis of the linear antenna array systems. The validity of the PSO algorithm in distinguishing between the desired signal and interferers is tested through considering uniform and non-uniform spaced linear array. The PSO is used to optimise the interspace between array elements at which maximum directivity is achieved. The simulations confirmed that smart system performance improvement in term of directivity, sidelobe level reduction and HPBW could be achieved through the use of PSO algorithm.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CAS47993.2019.9075465
Nabeel F. Lattoofi, I. Al-Sharuee, Mohammed Y. Kamil, Ayoob H. Obaid, Aya A. Mahidi, Ammar A. Omar, A. Saleh
Skin cancer is the most common cancers in the last years, especially in the human body; the Melanoma is the most destructive type of skin lesions. Detect cancer is important at the initial stage, but only an expert dermatologist can detect which one is non-melanoma and melanoma. Computer-aided diagnosis (CADs) application to skin cancer is relatively understudied. The purpose of this paper is the automated detection of Melanoma via digital image processing. In this project, the algorithm consists of automatic ABCD (asymmetry, border irregularity, colour, and dermoscopic structure) rule of dermoscopy lesions images is implemented. Before that, we use hair removal as a pre-processing step which is based on morphological filter and thresholding. Finally, the lesions are classified as either melanoma or benign. The used dataset is containing 200 dermoscopic images, where 120 are benign lesions and 80 malignant melanomas. The proposed method shows an accuracy of 93.2%, 92.59% specificity, and 90.15% sensitivity.
{"title":"Melanoma Skin Cancer Detection Based on ABCD Rule","authors":"Nabeel F. Lattoofi, I. Al-Sharuee, Mohammed Y. Kamil, Ayoob H. Obaid, Aya A. Mahidi, Ammar A. Omar, A. Saleh","doi":"10.1109/CAS47993.2019.9075465","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075465","url":null,"abstract":"Skin cancer is the most common cancers in the last years, especially in the human body; the Melanoma is the most destructive type of skin lesions. Detect cancer is important at the initial stage, but only an expert dermatologist can detect which one is non-melanoma and melanoma. Computer-aided diagnosis (CADs) application to skin cancer is relatively understudied. The purpose of this paper is the automated detection of Melanoma via digital image processing. In this project, the algorithm consists of automatic ABCD (asymmetry, border irregularity, colour, and dermoscopic structure) rule of dermoscopy lesions images is implemented. Before that, we use hair removal as a pre-processing step which is based on morphological filter and thresholding. Finally, the lesions are classified as either melanoma or benign. The used dataset is containing 200 dermoscopic images, where 120 are benign lesions and 80 malignant melanomas. The proposed method shows an accuracy of 93.2%, 92.59% specificity, and 90.15% sensitivity.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"8 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113990081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}