{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Tanya abdul-sattar jabor","doi":"10.25195/2017/4426","DOIUrl":"https://doi.org/10.25195/2017/4426","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69282036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. Thegenerated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomlykeystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity andspeed for Salsa (8, 12 and 20).
{"title":"A SUGGESTED SUPER SALSA STREAM CIPHER","authors":"M. S. Mahdi, N. Hassan","doi":"10.25195/ijci.v44i2.51","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.51","url":null,"abstract":"Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. Thegenerated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomlykeystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity andspeed for Salsa (8, 12 and 20).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45879263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.
{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Abbas Albakri, S. Al-Mamory, Hadeel H. Alfartosy","doi":"10.25195/ijci.v44i1.109","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.109","url":null,"abstract":"Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43351223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
License Plate Recognition (LPR) system becomes animportant research issue in recent years due to its importance to wideranges of commercial applications. The first and the most importantstage for any LPR system is the localization of the number platewithin the vehicle image. This paper presents a methodology for Iraqicars number plates extraction from the vehicle image using twomethods, the first one is morphological operations and the secondmethod is edge detection. The main idea is to use these two differentmethods in such away so that the number plate of the vehicle can beextracted precisely. These algorithms can quickly and correctly detectand extract the number plate from the vehicle image although therewas a little noise in the image. This paper also makes a comparisonbetween the two methods of extraction in results. The software thatused to build the systems is MATLAB R2014a
{"title":"AUTOMATIC IRAQI CARS NUMBER PLATES EXTRACTION","authors":"Safaa S. Omran, Jumana A. Jarallah","doi":"10.25195/ijci.v44i1.111","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.111","url":null,"abstract":"License Plate Recognition (LPR) system becomes animportant research issue in recent years due to its importance to wideranges of commercial applications. The first and the most importantstage for any LPR system is the localization of the number platewithin the vehicle image. This paper presents a methodology for Iraqicars number plates extraction from the vehicle image using twomethods, the first one is morphological operations and the secondmethod is edge detection. The main idea is to use these two differentmethods in such away so that the number plate of the vehicle can beextracted precisely. These algorithms can quickly and correctly detectand extract the number plate from the vehicle image although therewas a little noise in the image. This paper also makes a comparisonbetween the two methods of extraction in results. The software thatused to build the systems is MATLAB R2014a","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41509228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Random Number Generators are fundamental toolsfor cryptography protocols and algorithms. The basic problems thatface any crypto key generator are randomness, correlations anddistribution of the state of key sequence. This paper proposed a newmethod to enhance RNA crypto key generation. It has beenimplemented by extending the crypto key by applying polynomialconvolution technique which extracts the mask filter from the sameRNA key sequence depending on the start and end codon properties.This will provide another high level of extension and generaterandom-strength crypto key. The proposal approach could passthrough the statistical measurements successfully and achieved highrate of randomness (approximated to 96%).
{"title":"PROPOSED APPROACH FOR IMPROVING RNA CRYPTO-KEY BASED ON POLYNOMIAL CONVOLUTION","authors":"Estabraq Abdulredaa Kadhim","doi":"10.25195/ijci.v44i1.65","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.65","url":null,"abstract":"Random Number Generators are fundamental toolsfor cryptography protocols and algorithms. The basic problems thatface any crypto key generator are randomness, correlations anddistribution of the state of key sequence. This paper proposed a newmethod to enhance RNA crypto key generation. It has beenimplemented by extending the crypto key by applying polynomialconvolution technique which extracts the mask filter from the sameRNA key sequence depending on the start and end codon properties.This will provide another high level of extension and generaterandom-strength crypto key. The proposal approach could passthrough the statistical measurements successfully and achieved highrate of randomness (approximated to 96%).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most importantissues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routingin wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within anexact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayerperceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller(RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate trafficcongestion along the selected route. A comparison study between the network with and without controller in terms of: trafficreceived to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of RadialBasis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.
{"title":"A RADIAL BASIS NEURAL NETWORK CONTROLLER TO SOLVE CONGESTION IN WIRELESS SENSOR NETWORKS","authors":"M. Hussain","doi":"10.25195/2017/4419","DOIUrl":"https://doi.org/10.25195/2017/4419","url":null,"abstract":"In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most importantissues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routingin wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within anexact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayerperceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller(RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate trafficcongestion along the selected route. A comparison study between the network with and without controller in terms of: trafficreceived to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of RadialBasis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44718667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah
LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of acompany. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposedprotocol facilitates information exchange among individuals by providing many communication options. It is a standaloneapplication using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).
{"title":"DESIGN AND IMPLEMENT CHAT PROGRAM USING TCP/IP","authors":"Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah","doi":"10.25195/2017/4417","DOIUrl":"https://doi.org/10.25195/2017/4417","url":null,"abstract":"LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of acompany. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposedprotocol facilitates information exchange among individuals by providing many communication options. It is a standaloneapplication using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit
{"title":"LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT","authors":"Hiba Taresh","doi":"10.25195/2017/4411","DOIUrl":"https://doi.org/10.25195/2017/4411","url":null,"abstract":"In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41343571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution","authors":"Estabraq Abdul Redaa Kadhim","doi":"10.25195/2017/4412","DOIUrl":"https://doi.org/10.25195/2017/4412","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43505091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequencycomponents of the speech signal with the data of the image where the high frequency speech components are separated and analyzed usingthe Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).
{"title":"IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM","authors":"M. Al-Turfi","doi":"10.25195/2017/4418","DOIUrl":"https://doi.org/10.25195/2017/4418","url":null,"abstract":"This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequencycomponents of the speech signal with the data of the image where the high frequency speech components are separated and analyzed usingthe Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43542308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}