Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075575
Nadhim Azeez Sayel, B. Sabbar, Salah Albermany
This paper introduces a real time control system of disabled electric wheel chair based on using electroencephalography (EEG) data and make sense of it. The main goal is increasing the accuracy rate of the brain control system by using a machine learning algorithm called back propagation (BP). There are a lot of EEG samples taken from a lot of people who all had healthy brains so that they can pick the best EEG channel that can be used as a learning input. After classification, the channels AF3 and AF4 are the most important EEG channels in (Emotiv). For directional classification, AF3 is the most important channel for left and AF4 is the most important channel for right. A microcontroller called an Arduino is used to control the movement of the wheels, and our software is used to do this. There is now a brain-controlled electric wheelchair with better and more accurate EEG classification as a result of this study.
{"title":"Real Time Control System for Wheel Chair of Disabled People Using EEG Signal","authors":"Nadhim Azeez Sayel, B. Sabbar, Salah Albermany","doi":"10.1109/ICOASE56293.2022.10075575","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075575","url":null,"abstract":"This paper introduces a real time control system of disabled electric wheel chair based on using electroencephalography (EEG) data and make sense of it. The main goal is increasing the accuracy rate of the brain control system by using a machine learning algorithm called back propagation (BP). There are a lot of EEG samples taken from a lot of people who all had healthy brains so that they can pick the best EEG channel that can be used as a learning input. After classification, the channels AF3 and AF4 are the most important EEG channels in (Emotiv). For directional classification, AF3 is the most important channel for left and AF4 is the most important channel for right. A microcontroller called an Arduino is used to control the movement of the wheels, and our software is used to do this. There is now a brain-controlled electric wheelchair with better and more accurate EEG classification as a result of this study.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075609
M. M. Salih, K. I. Alsaif
In this paper, we built a Desktop Application for a new encoding method presented to help disabled Arabic-speaking people. The proposed encoding method depends on the direction of the pupil of the eye so that the most frequently used letters have the shortest codes. The language characters are converted into a sign of the direction of movement of the human eye's pupil. The proposed system is a text entry system consisting of three parts. The first part included a CNN-based algorithm for evaluating the direction of the eye pupil, and the second part was an algorithm for building an encoding triple tree to generate the symbol for Arabic letters, while the third part involved Translate codes to its corresponding letter. The system was tested by a number of well-trained participants. The accuracy of the system goes up to 99.3% while the system's sensitivity reached 88.5% and total specificity 99.6%. also SCR and MSD metrics are computed.
{"title":"Arabic Code Generation based on Four Direction of Human Eye","authors":"M. M. Salih, K. I. Alsaif","doi":"10.1109/ICOASE56293.2022.10075609","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075609","url":null,"abstract":"In this paper, we built a Desktop Application for a new encoding method presented to help disabled Arabic-speaking people. The proposed encoding method depends on the direction of the pupil of the eye so that the most frequently used letters have the shortest codes. The language characters are converted into a sign of the direction of movement of the human eye's pupil. The proposed system is a text entry system consisting of three parts. The first part included a CNN-based algorithm for evaluating the direction of the eye pupil, and the second part was an algorithm for building an encoding triple tree to generate the symbol for Arabic letters, while the third part involved Translate codes to its corresponding letter. The system was tested by a number of well-trained participants. The accuracy of the system goes up to 99.3% while the system's sensitivity reached 88.5% and total specificity 99.6%. also SCR and MSD metrics are computed.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"25 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075574
Abdulghafor Khudhaer Abdullah, S. Mohammed, Ali Al-Naji
The tongue reflects the state of the internal organs of the body and their abnormal behavior, such as problems of the heart, liver, pancreas, stomach, intestines, blood diseases, etc., which leads to changes in some of the features and characteristics of the tongue. The most important of which is the color of the tongue, which can be adopted as a vital criterion that can be used in computerized diagnostic systems. Quantitative diagnosis of the tongue requires some devices, including image acquisition devices such as cameras, light sources, filters, color checkers, and image analysis and processing devices by applying some algorithms or image processing and color correction programs in addition to the computer. These devices are called Tongue Diagnostic Systems. This study proposes a real-time imaging system to diagnose some diseases related to tongue color using a Webcam under specific conditions. The proposed system was designed by MATLAB environment Graphical User Interfaces, with an audio message specifying the tongue color and type of disease and sending an SMS with the result of the examination to the mobile phone of the patient or to the person providing the care for the patient. After testing the system on a data set of 50 images, the preliminary results showed that the proposed system gives diagnosis accurate rate of 94% compared to laboratory results. With ease of use and implementation and low cost. This gives impetus to further studies to apply computerized diagnosis in medical applications, to enhance the medical reality, monitor patient health, and make an accurate diagnosis.
{"title":"Tongue Color Analysis and Disease Diagnosis Based on a Computer Vision System","authors":"Abdulghafor Khudhaer Abdullah, S. Mohammed, Ali Al-Naji","doi":"10.1109/ICOASE56293.2022.10075574","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075574","url":null,"abstract":"The tongue reflects the state of the internal organs of the body and their abnormal behavior, such as problems of the heart, liver, pancreas, stomach, intestines, blood diseases, etc., which leads to changes in some of the features and characteristics of the tongue. The most important of which is the color of the tongue, which can be adopted as a vital criterion that can be used in computerized diagnostic systems. Quantitative diagnosis of the tongue requires some devices, including image acquisition devices such as cameras, light sources, filters, color checkers, and image analysis and processing devices by applying some algorithms or image processing and color correction programs in addition to the computer. These devices are called Tongue Diagnostic Systems. This study proposes a real-time imaging system to diagnose some diseases related to tongue color using a Webcam under specific conditions. The proposed system was designed by MATLAB environment Graphical User Interfaces, with an audio message specifying the tongue color and type of disease and sending an SMS with the result of the examination to the mobile phone of the patient or to the person providing the care for the patient. After testing the system on a data set of 50 images, the preliminary results showed that the proposed system gives diagnosis accurate rate of 94% compared to laboratory results. With ease of use and implementation and low cost. This gives impetus to further studies to apply computerized diagnosis in medical applications, to enhance the medical reality, monitor patient health, and make an accurate diagnosis.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075592
S. Amanuel, Ibrahim M. Ahmed
Cloud computing (CC) provides network services on request, especially data storage and processing capacity, without users' specific and direct management. CC recently became a collection of public and private data centers that provide the customer with a shared Internet network. Edge Computing is an emerging computing and knowledge storage model that puts end-users closer together to increase reaction times and save communication power. However, CC and edge computing face protection issues, including customer risk and corporate recognition, that hinder the swift implementation of computing modelling. One solution to this problem, because of its complexity and severity, is Machine Learning (ML) which consists of researching computational algorithms and naturally advancing knowledge. The problem and solution issues are raised by the overview article that analyses CC safety risks, problems, and solutions that use one or more ML algorithms. Study various ML algorithms, such as controlled, unmonitored, semi-supervised, and enforced training, to solve cloud protection problems. The paper assesses each technique's efficiency based on its characteristics, advantages, and drawbacks. In addition, it will have potential study guidance on safeguarding CC usage and applications.
{"title":"A Review of the Various Machine Learning Algorithms for Cloud Computing","authors":"S. Amanuel, Ibrahim M. Ahmed","doi":"10.1109/ICOASE56293.2022.10075592","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075592","url":null,"abstract":"Cloud computing (CC) provides network services on request, especially data storage and processing capacity, without users' specific and direct management. CC recently became a collection of public and private data centers that provide the customer with a shared Internet network. Edge Computing is an emerging computing and knowledge storage model that puts end-users closer together to increase reaction times and save communication power. However, CC and edge computing face protection issues, including customer risk and corporate recognition, that hinder the swift implementation of computing modelling. One solution to this problem, because of its complexity and severity, is Machine Learning (ML) which consists of researching computational algorithms and naturally advancing knowledge. The problem and solution issues are raised by the overview article that analyses CC safety risks, problems, and solutions that use one or more ML algorithms. Study various ML algorithms, such as controlled, unmonitored, semi-supervised, and enforced training, to solve cloud protection problems. The paper assesses each technique's efficiency based on its characteristics, advantages, and drawbacks. In addition, it will have potential study guidance on safeguarding CC usage and applications.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075611
Araz Rajab Ibrahim
In recent years, sending digital photos over open networks has become a serious privacy concern. Sadly, there are a lot of privacy and security risks present despite the environment's suitability and great benefits. The novel image encryption technique proposed in this paper is based on the two-dimensional Hénon map, which is used twice to produce the random sequences required for confusion and diffusion. The 2-D Hénon map initial random sequence key is used to stream-scramble the pixels in each and every block of the image during the confusion stage. At the diffusion stage, the second random sequence key is used in a triple XOR structure to change the pixel positions and create an encrypted image. The experiments' findings show that the suggested approach fixes the problems with traditional encryption methods. The proposed method costs less to compute and performs better on many security tests. Because of its size, the key space cannot be protected from brute-force attacks. The histogram of the encrypted image differs from the original image and is evenly spaced. The results of the correlation test reveal no correlation between the adjacent pixels. The suggested algorithm is sensitive to the key value, and even small changes result in a different image. Therefore, real-time image encryption applications over open networks are appropriate for the novel approach.
{"title":"Combination of Stream and Block Image Encryption Algorithms in Pixel Scrambling Using Henon Map","authors":"Araz Rajab Ibrahim","doi":"10.1109/ICOASE56293.2022.10075611","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075611","url":null,"abstract":"In recent years, sending digital photos over open networks has become a serious privacy concern. Sadly, there are a lot of privacy and security risks present despite the environment's suitability and great benefits. The novel image encryption technique proposed in this paper is based on the two-dimensional Hénon map, which is used twice to produce the random sequences required for confusion and diffusion. The 2-D Hénon map initial random sequence key is used to stream-scramble the pixels in each and every block of the image during the confusion stage. At the diffusion stage, the second random sequence key is used in a triple XOR structure to change the pixel positions and create an encrypted image. The experiments' findings show that the suggested approach fixes the problems with traditional encryption methods. The proposed method costs less to compute and performs better on many security tests. Because of its size, the key space cannot be protected from brute-force attacks. The histogram of the encrypted image differs from the original image and is evenly spaced. The results of the correlation test reveal no correlation between the adjacent pixels. The suggested algorithm is sensitive to the key value, and even small changes result in a different image. Therefore, real-time image encryption applications over open networks are appropriate for the novel approach.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114943076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}