Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759904
A. Ali, H. A. Hussein
This paper describes systematically two methods used in intelligent transportation systems: Distance Estimation using an onboard camera and car position detection. Distance estimation is a method for detecting distance for the preceding vehicles based on monocular camera. Vehicle position detection is a method of specifying the vehicle position relative to the road that can serve as Lane Departure Warning system. These two approaches have been discussed and implemented in this article. For lane detection and tracking, Hough Transform and Kalman filter were adopted. A brief introduction about both lane detection system and object detection is given. Finally, both approaches have been evaluated on a large dataset of videos.
{"title":"Distance estimation and vehicle position detection based on monocular camera","authors":"A. Ali, H. A. Hussein","doi":"10.1109/AIC-MITCSA.2016.7759904","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759904","url":null,"abstract":"This paper describes systematically two methods used in intelligent transportation systems: Distance Estimation using an onboard camera and car position detection. Distance estimation is a method for detecting distance for the preceding vehicles based on monocular camera. Vehicle position detection is a method of specifying the vehicle position relative to the road that can serve as Lane Departure Warning system. These two approaches have been discussed and implemented in this article. For lane detection and tracking, Hough Transform and Kalman filter were adopted. A brief introduction about both lane detection system and object detection is given. Finally, both approaches have been evaluated on a large dataset of videos.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759924
Mohammed Y. Kamil
The morphological operations commonly used image gradient for gray level images in medical images. Medical images are usually poorly illuminated and several edges are not visible accurately. This paper have used the morphological gradient (erosion-dilation computation) of the fuzzy mathematical morphology based on Hamacher t-norm and t-conorm, and comparison with classical morphological gradient. The results of evaluation shown clearly of the effectiveness of the fuzzy morphological approach in brain magnetic resonance imaging compared to classical morphological based on statistical image quality.
{"title":"Morphological gradient in brain magnetic resonance imaging based on intuitionistic fuzzy approach","authors":"Mohammed Y. Kamil","doi":"10.1109/AIC-MITCSA.2016.7759924","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759924","url":null,"abstract":"The morphological operations commonly used image gradient for gray level images in medical images. Medical images are usually poorly illuminated and several edges are not visible accurately. This paper have used the morphological gradient (erosion-dilation computation) of the fuzzy mathematical morphology based on Hamacher t-norm and t-conorm, and comparison with classical morphological gradient. The results of evaluation shown clearly of the effectiveness of the fuzzy morphological approach in brain magnetic resonance imaging compared to classical morphological based on statistical image quality.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759956
A. Ali, Sameer S. Mustafa, Ali Hilal Mutlag
Solar panels work best in certain weather conditions, but the weather is changing always, so most panels do not operate under ideal conditions. Design optimization of photovoltaic (PV) modules with changing in the environmental parameters, such as solar irradiance and temperature is presented in this work for Kirkuk city based on HOMER software. Our system consists of series-parallel combination of solar PV panels, maximum power point tracking controller (MPPT), batteries and converter. Four case studies using different types of sun tracking systems considering temperature effects were presented. The optimum system design which has the minimum cost of energy (COE) and total net present cost (NPC) was achieved when we adopt two-axis tracking system. Both NPC and COE were found inversely proportion with temperature coefficient of power, and direct proportion with operating cell temperature.
{"title":"Design optimization of solar power system with respect to temperature and sun tracking","authors":"A. Ali, Sameer S. Mustafa, Ali Hilal Mutlag","doi":"10.1109/AIC-MITCSA.2016.7759956","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759956","url":null,"abstract":"Solar panels work best in certain weather conditions, but the weather is changing always, so most panels do not operate under ideal conditions. Design optimization of photovoltaic (PV) modules with changing in the environmental parameters, such as solar irradiance and temperature is presented in this work for Kirkuk city based on HOMER software. Our system consists of series-parallel combination of solar PV panels, maximum power point tracking controller (MPPT), batteries and converter. Four case studies using different types of sun tracking systems considering temperature effects were presented. The optimum system design which has the minimum cost of energy (COE) and total net present cost (NPC) was achieved when we adopt two-axis tracking system. Both NPC and COE were found inversely proportion with temperature coefficient of power, and direct proportion with operating cell temperature.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127270094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759930
R. S. Mohammed, Enas Mohammed Hussien, Jinan Redha Mutter
Privacy Preserving Association Rule Mining (PPAM) becomes an important issue in recent years. Since data mining alone is not enough to share data between companies without privacy preserving. In this paper, a new technique has been proposed to maintain the confidentiality of the data by fabricating of association rule using a stochastic standard map without returning to mining sensitive data again. The system simulation using Matlab and tested that shows the successful difference between the original data and fabricated. And also been achieved high speed and fewer memory requirements.
{"title":"A novel technique of privacy preserving association rule mining","authors":"R. S. Mohammed, Enas Mohammed Hussien, Jinan Redha Mutter","doi":"10.1109/AIC-MITCSA.2016.7759930","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759930","url":null,"abstract":"Privacy Preserving Association Rule Mining (PPAM) becomes an important issue in recent years. Since data mining alone is not enough to share data between companies without privacy preserving. In this paper, a new technique has been proposed to maintain the confidentiality of the data by fabricating of association rule using a stochastic standard map without returning to mining sensitive data again. The system simulation using Matlab and tested that shows the successful difference between the original data and fabricated. And also been achieved high speed and fewer memory requirements.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759903
S. T. Allawi, J. H. Al-A’meri
A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column in the resulting image of the first encryption process. The experimental results show that the new proposed method is efficient and has high security features.
{"title":"Image encryption based on linear feedback shift register method","authors":"S. T. Allawi, J. H. Al-A’meri","doi":"10.1109/AIC-MITCSA.2016.7759903","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759903","url":null,"abstract":"A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column in the resulting image of the first encryption process. The experimental results show that the new proposed method is efficient and has high security features.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759931
R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif
In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.
{"title":"Image encryption technique using clustering and stochastic standard map","authors":"R. S. Mohammed, Fadhil Hanoon Abbood, Intisar Abid Yousif","doi":"10.1109/AIC-MITCSA.2016.7759931","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759931","url":null,"abstract":"In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution processes are done by using a series of secret keys that generated by proposed stochastic standard map. Image decryption is done using the reverse operations of image encryption and using adding process rather than clustering to recover an image. Experimental results verify and prove that the proposed technique is secure and fast.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759912
A. I. Majeed, A. Ali
This paper introduces a complete plan for design and implementation of a biomimetic robotic fish. The robot design is physically based on a model of a Carp fish. The designed robot has a rigid anterior body part, flexible posterior body part and a flexible caudal fin. The flexible posterior body part is consists of four links and are driven by four servomotors in addition to a fifth one for controlling the robot pitch angle through changing the centre of gravity position. The designed robot was also equipped with diving system which consists of a water pump and an internal tank. The fish locomotion control is divided into speed, orientation, diving and transient motion control. The swimming of the robotic fish was relied on the so called behavioural based control system that makes use of a sensor fusion algorithm. The innovative design of the robotic fish combines the two schemes of the underwater vehicles or robots control in that it can swim autonomously or remotely controlled by a personal computer via WiFi link. The experimental results of the designed robotic fish show the excellent feasibility and high performance of the proposed design.
{"title":"Design and implementation of swimming robot based on Carp fish biomimetic","authors":"A. I. Majeed, A. Ali","doi":"10.1109/AIC-MITCSA.2016.7759912","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759912","url":null,"abstract":"This paper introduces a complete plan for design and implementation of a biomimetic robotic fish. The robot design is physically based on a model of a Carp fish. The designed robot has a rigid anterior body part, flexible posterior body part and a flexible caudal fin. The flexible posterior body part is consists of four links and are driven by four servomotors in addition to a fifth one for controlling the robot pitch angle through changing the centre of gravity position. The designed robot was also equipped with diving system which consists of a water pump and an internal tank. The fish locomotion control is divided into speed, orientation, diving and transient motion control. The swimming of the robotic fish was relied on the so called behavioural based control system that makes use of a sensor fusion algorithm. The innovative design of the robotic fish combines the two schemes of the underwater vehicles or robots control in that it can swim autonomously or remotely controlled by a personal computer via WiFi link. The experimental results of the designed robotic fish show the excellent feasibility and high performance of the proposed design.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759902
R. H. Thaher, Saif Nadhim Alsaidy
The present work investigates the operation performance of a new shape diamond patch microstrip antenna. The proposed diamond antenna covers the bandwidth from 2.3GHz to 18.5GHz that meets the essential requirements of wide band communications applications, and gives gain ranging from -2.6dBi to 5.3dBi. Three slots are of two T-shapes and one S-shape added to diamond patch to improve the gain, therefore the gain becomes in the range from 0dBi to 8dBi. This antenna is fabricated and tested practically and found good agreement between the simulation and measured results.
{"title":"Design and fabrication of new diamond patch antenna for wireless communications","authors":"R. H. Thaher, Saif Nadhim Alsaidy","doi":"10.1109/AIC-MITCSA.2016.7759902","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759902","url":null,"abstract":"The present work investigates the operation performance of a new shape diamond patch microstrip antenna. The proposed diamond antenna covers the bandwidth from 2.3GHz to 18.5GHz that meets the essential requirements of wide band communications applications, and gives gain ranging from -2.6dBi to 5.3dBi. Three slots are of two T-shapes and one S-shape added to diamond patch to improve the gain, therefore the gain becomes in the range from 0dBi to 8dBi. This antenna is fabricated and tested practically and found good agreement between the simulation and measured results.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759922
H. Alzakki, V. Tsviatkou
A method for texture images segmentation based on classification of contour elements and logical addition of classes. The essence of the method consists in the contouring of the image, determining the position of contour elements in the image of different types (points, lines, and shapes) converting closely spaced similar contour elements into binary regions objects, binary coding mutual position obtained areal objects within the boundaries of the image segmentation are resulting in code matrix.
{"title":"Texture image segmentation based on classification of contour elements and logical addition of classes","authors":"H. Alzakki, V. Tsviatkou","doi":"10.1109/AIC-MITCSA.2016.7759922","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759922","url":null,"abstract":"A method for texture images segmentation based on classification of contour elements and logical addition of classes. The essence of the method consists in the contouring of the image, determining the position of contour elements in the image of different types (points, lines, and shapes) converting closely spaced similar contour elements into binary regions objects, binary coding mutual position obtained areal objects within the boundaries of the image segmentation are resulting in code matrix.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759953
Nahla Abdul Jalil Salih
The proposed technique presents adaptive new method used to decrease the encoding time in “fractal coding algorithms”. This technique reduces the “number of transforms” used to each domain block. So, the time required for the comparison between one “range block and domain blocks” is decreased. In this technique we partitioned the image depending on the Variance Criteria. Different block sizes ranging (4-16) have been used. The results show that the number of partitions (blocks), produced by quadtree partition, depends strongly on the adopted partitioning parameters (i.e. the Standard deviation, Mean, Minimum, and Maximum block size). The selection of small values of Mean(0.1-0.4) and Standard deviation (0.5-3) had reconstructed high image quality and low compression ratio,(e.g. we get PSNR =34.8dB and CR=4.89 E.T=18s) and vice versa.
该方法为减少“分形编码算法”中的编码时间提供了一种自适应的新方法。这种技术减少了用于每个域块的“转换次数”。因此,减少了在一个“范围块和域块”之间进行比较所需的时间。在这种技术中,我们根据方差标准对图像进行分区。使用了不同的块大小(4-16)。结果表明,四叉树分区产生的分区(块)数量强烈依赖于所采用的分区参数(即标准差、均值、最小和最大块大小)。选取均值(0.1-0.4)和标准差(0.5-3)的小数值,重建出高质量的图像和低压缩比(如:我们得到PSNR =34.8dB, CR=4.89 et =18s,反之亦然。
{"title":"Fractal coding technique based on different block size","authors":"Nahla Abdul Jalil Salih","doi":"10.1109/AIC-MITCSA.2016.7759953","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759953","url":null,"abstract":"The proposed technique presents adaptive new method used to decrease the encoding time in “fractal coding algorithms”. This technique reduces the “number of transforms” used to each domain block. So, the time required for the comparison between one “range block and domain blocks” is decreased. In this technique we partitioned the image depending on the Variance Criteria. Different block sizes ranging (4-16) have been used. The results show that the number of partitions (blocks), produced by quadtree partition, depends strongly on the adopted partitioning parameters (i.e. the Standard deviation, Mean, Minimum, and Maximum block size). The selection of small values of Mean(0.1-0.4) and Standard deviation (0.5-3) had reconstructed high image quality and low compression ratio,(e.g. we get PSNR =34.8dB and CR=4.89 E.T=18s) and vice versa.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}