Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.463
J. I. Naser, H. Al-Salman
Software risk management refers to systematic process for analyzing and identifying the project risks. The present paper provides a hybrid method for IT software risks identification. Software projects possess different features which increase the project failure possibilities. Therefore, the present work integrate the Artificial Neural network with the Analytic Hierarchy Process (AHP-ANN) in order to solve the problem of software project estimation in early stage. The questionnaire developed to find out the risk functional model and provide the proposed method with proper data. The results observe a major common risk in software projects is the insufficient knowledge based on different software project life cycle stages. Also, there are some other important factors in software projects such as lack of good estimation in project scheduling, poor definition of project requirements which cause human errors.
{"title":"Monitoring software risks based on integrated AHP-ANN method","authors":"J. I. Naser, H. Al-Salman","doi":"10.29304/JQCM.2019.11.1.463","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.463","url":null,"abstract":"Software risk management refers to systematic process for analyzing and identifying the project risks. The present paper provides a hybrid method for IT software risks identification. Software projects possess different features which increase the project failure possibilities. Therefore, the present work integrate the Artificial Neural network with the Analytic Hierarchy Process (AHP-ANN) in order to solve the problem of software project estimation in early stage. The questionnaire developed to find out the risk functional model and provide the proposed method with proper data. The results observe a major common risk in software projects is the insufficient knowledge based on different software project life cycle stages. Also, there are some other important factors in software projects such as lack of good estimation in project scheduling, poor definition of project requirements which cause human errors.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.470
A. M. Rahma, D. Jabbar
Information security cryptographic protocols are very important in the modern era due to the development and advanced technology in internet applications and networks communications. In this paper, we proposed a protocol to save information from passive attacks when sending between two nodes over an insecure channel. This proposed protocol relies on magic square of size 3*3, linear equation system and finite field.
{"title":"Development cryptography protocol based on Magic Square and Linear Algebra System","authors":"A. M. Rahma, D. Jabbar","doi":"10.29304/JQCM.2019.11.1.470","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.470","url":null,"abstract":"Information security cryptographic protocols are very important in the modern era due to the development and advanced technology in internet applications and networks communications. In this paper, we proposed a protocol to save information from passive attacks when sending between two nodes over an insecure channel. This proposed protocol relies on magic square of size 3*3, linear equation system and finite field.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.465
S. Kharofa
The Fuzzy C-Mean algorithm is one of the most famous fuzzy clustering techniques. The process of fuzzy clustering is a useful method in analyzing many patterns and images. The Fuzzy C-Mean algorithm is widely used and based on the objective function reduction through adding membership values and the fuzzy coefficient. The Mean Absolute Error (MAE) was also measured in this research for each execution. The research found that when the number of clusters increases, the mean absolute error value is reduced. When the number of clusters increased. The more details in the resulting image were not present in the original image. This helps in the analysis of the images. In this research, medical images were treated and analyzed. The analysis helps physicians explain the patient's health status and also according to suggested algorithm helps them to diagnose the possibility of a particular disease or tumor. A Matlab program was created to perform the analysis.
{"title":"Images Analysis by Using Fuzzy Clustering","authors":"S. Kharofa","doi":"10.29304/JQCM.2019.11.1.465","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.465","url":null,"abstract":"The Fuzzy C-Mean algorithm is one of the most famous fuzzy clustering techniques. The process of fuzzy clustering is a useful method in analyzing many patterns and images. The Fuzzy C-Mean algorithm is widely used and based on the objective function reduction through adding membership values and the fuzzy coefficient. The Mean Absolute Error (MAE) was also measured in this research for each execution. The research found that when the number of clusters increases, the mean absolute error value is reduced. When the number of clusters increased. The more details in the resulting image were not present in the original image. This helps in the analysis of the images. \u0000In this research, medical images were treated and analyzed. The analysis helps physicians explain the patient's health status and also according to suggested algorithm helps them to diagnose the possibility of a particular disease or tumor. A Matlab program was created to perform the analysis.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126299905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.469
Waleed F. Shareef, Nasheed F. Mossa
Using wireless sensor network technology in structure health monitoring applications results in generating large amount of data. To sift through this data and extract useful information an extensive data analysis should be applied. In this paper, a Wireless Sensor Network (WSNs) is proposed for the oil pipeline monitoring system with proposed method for event detection and classification. The method depends on the Principal Component Analysis (PCA). It applied to features extracted from vibration signals of the monitored pipeline. These vibration signals are collected while applying damage events (knocking and drilling) to the oil pipeline. PCA is applied to features extracted from both time domain and frequency domain. The results manifest that this method is able to detect the existence of damage and also to distinguish between the different levels of harmful events applied to the pipeline.
{"title":"PCA Classification of vibration signals in WSN based oil pipeline monitoring system","authors":"Waleed F. Shareef, Nasheed F. Mossa","doi":"10.29304/JQCM.2019.11.1.469","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.469","url":null,"abstract":"Using wireless sensor network technology in structure health monitoring applications results in generating large amount of data. To sift through this data and extract useful information an extensive data analysis should be applied. In this paper, a Wireless Sensor Network (WSNs) is proposed for the oil pipeline monitoring system with proposed method for event detection and classification. The method depends on the Principal Component Analysis (PCA). It applied to features extracted from vibration signals of the monitored pipeline. These vibration signals are collected while applying damage events (knocking and drilling) to the oil pipeline. PCA is applied to features extracted from both time domain and frequency domain. The results manifest that this method is able to detect the existence of damage and also to distinguish between the different levels of harmful events applied to the pipeline.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.466
S. Hussein, Lubab Ahmed Tawfeeq, Sukaina Sh Altyar
Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or to using another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classifier (NCC). The samples had been taken from 2850 actual sufferers cases that had been treated at Urology and Nephrology center of Iraq. The results from three cases have been compared to actual treatment results of (ESWL) for trained and non-trained cases and compared the results of three models. The results show that (NCC) approach is the most accurate method in prediction the efficient of uses (ESWL) remedy in treatment the kidney stone.
{"title":"Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier","authors":"S. Hussein, Lubab Ahmed Tawfeeq, Sukaina Sh Altyar","doi":"10.29304/JQCM.2019.11.1.466","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.466","url":null,"abstract":"Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or to using another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classifier (NCC). The samples had been taken from 2850 actual sufferers cases that had been treated at Urology and Nephrology center of Iraq. The results from three cases have been compared to actual treatment results of (ESWL) for trained and non-trained cases and compared the results of three models. The results show that (NCC) approach is the most accurate method in prediction the efficient of uses (ESWL) remedy in treatment the kidney stone.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131982330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/JQCM.2019.11.1.464
Mustafa M. Abd Zaid, Soukaena Hassan
As a significant number of applications in mobile transactions and wireless sensor networks are characterized by short duration sessions, security issues turn into a focal concern. RC4 algorithm is a standout amongst the most broadly utilized stream ciphers which locates its application in numerous security conventions, for example, Wired Equivalence Privacy (WEP) and Wi-Fi Protocol Access (WPA). In this paper, we suggest a lightweight variation of the well-known RC4 algorithm that is exceptionally appropriate for resources of computational compelled gadgets and energy in remote systems, when contrasted with RC4 and its variations like, HC128, Grain-128, and so on.,. We propose new PRGA which is replaced the PRGA keystream generation algorithm of RC4. The proposed LRC4 execution is surveyed in terms of randomness test and time under an arrangement of analyses. The trial comes about demonstrate that the resulting stream are random, and the suggested algorithm quicker compared to standard RC4, the results indicate the average of speed improvement is about 54% in both encryption/decryption sides.
{"title":"Lightweight RC4 Algorithm","authors":"Mustafa M. Abd Zaid, Soukaena Hassan","doi":"10.29304/JQCM.2019.11.1.464","DOIUrl":"https://doi.org/10.29304/JQCM.2019.11.1.464","url":null,"abstract":"As a significant number of applications in mobile transactions and wireless sensor networks are characterized by short duration sessions, security issues turn into a focal concern. \u0000RC4 algorithm is a standout amongst the most broadly utilized stream ciphers which locates its application in numerous security conventions, for example, Wired Equivalence Privacy (WEP) and Wi-Fi Protocol Access (WPA). \u0000In this paper, we suggest a lightweight variation of the well-known RC4 algorithm that is exceptionally appropriate for resources of computational compelled gadgets and energy in remote systems, when contrasted with RC4 and its variations like, HC128, Grain-128, and so on.,. We propose new PRGA which is replaced the PRGA keystream generation algorithm of RC4. \u0000The proposed LRC4 execution is surveyed in terms of randomness test and time under an arrangement of analyses. The trial comes about demonstrate that the resulting stream are random, and the suggested algorithm quicker compared to standard RC4, the results indicate the average of speed improvement is about 54% in both encryption/decryption sides.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123220983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.29304/jqcm.2019.11.1.468
F. Alkinani, A. M. Rahma
Kekre Median Codebook Generation (KMCG) is a vector quantization algorithm. It is used for several purposes like image compression and segmentation. It has been applied by several application and shows its efficiency. This paper presents a comparison study of applying KMCG with three color models: RGB, YCbCr, and HSV for image segmentation. The experiments applied on five images, three of them are benchmarks. Two numerical metrics are utilized: E measure and Peak Signal to Noise Ratio (PSNR), in addition to the visual results. The final results show that KMCG conducts better segments when it is applied with the RGB color model. It returns more homogenies segments than using KMCG with YCbCr or HSV.
{"title":"A Comparative Study of KMCG Segmentation Based on YCbCr, RGB, and HSV Color Spaces","authors":"F. Alkinani, A. M. Rahma","doi":"10.29304/jqcm.2019.11.1.468","DOIUrl":"https://doi.org/10.29304/jqcm.2019.11.1.468","url":null,"abstract":"Kekre Median Codebook Generation (KMCG) is a vector quantization algorithm. It is used for several purposes like image compression and segmentation. It has been applied by several application and shows its efficiency. This paper presents a comparison study of applying KMCG with three color models: RGB, YCbCr, and HSV for image segmentation. The experiments applied on five images, three of them are benchmarks. Two numerical metrics are utilized: E measure and Peak Signal to Noise Ratio (PSNR), in addition to the visual results. The final results show that KMCG conducts better segments when it is applied with the RGB color model. It returns more homogenies segments than using KMCG with YCbCr or HSV.","PeriodicalId":418998,"journal":{"name":"Journal of Al-Qadisiyah for computer science and mathematics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133730759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}