Table of content

Iraqi Journal for Computers and Informatics

المجلة العراقية للحاسبات والمعلوماتية

ISSN: 2313190X 25204912
Publisher: University Of Information Technology And Communications
Faculty:
Language: Arabic and English

This journal is Open Access

About

IJCI is a peer-review institutional journal issued by the University of Information Technology and Communications (UoITC) in Baghdad- Iraq; UoITC is one of governmental universities which established by the Ministry of Higher Education in Iraq. IJCI aims to contribute to the constant scientific research and to provide a sober scientific journal that enriches scholars around the world and it deals with all aspects of computer science.

Loading...
Contact info

Principal Contact
Prof. Dr. Safaa O. Al-mamory,
University of Information Technology and Communications
Baghdad - Iraq
Al-Nidal St. , Near Ibn Al-Haitham Hospital
Email: editor_ijci@uoitc.edu.iq
Phone: 009647802355417

Table of content: 2018 volume:44 issue:1

Article
LT10 a Lightweight Proposed Encryption Algorithm for IOT

Authors: Alaa Q. Raheema
Pages: 1-5
Loading...
Loading...
Abstract

In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit.


Article
Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution

Authors: Estabraq Abdulredaa Kadhim
Pages: 6-11
Loading...
Loading...
Abstract

Random Number Generators are fundamental tools for cryptography protocols and algorithms. The basic problems that face any crypto key generator are randomness, correlations and distribution of the state of key sequence. This paper proposed a new method to enhance RNA crypto key generation. It has been implemented by extending the crypto key by applying polynomial convolution technique which extracts the mask filter from the same RNA key sequence depending on the start and end codon properties. This will provide another high level of extension and generate random-strength crypto key. The proposal approach could pass through the statistical measurements successfully and achieved high rate of randomness (approximated to 96%).


Article
Efficient Routing Protocol Algorithm for Wireless Sensor Networks

Loading...
Loading...
Abstract

These Recently, different applications of wireless sensor networks in the industry fields using different data transfer protocols has been developed. As the power of sensor nodes is limited, prolonging network lifetime in wireless sensor networks (WSNs) considered a critical issue. To develop the network permanence, researchers had considered power consumption in routing protocols of WSNs by using modified Low Energy Adaptive Clustering Hierarchy. This article presents a developed effective transfer protocols for autonomic WSNs. An efficient routing scheme for wireless sensor network regarded as significant components of electronic devices is proposed. An optimal election probability of a node to become cluster head has being presented. In addition, this article uses a Voronoi diagram, which decomposes the nodes into regions around each node. This diagram used in management architecture for a wireless sensor network..


Article
Feature-Based Face Detection: A Survey

Loading...
Loading...
Abstract

Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.


Article
Proposed Lightweight Protocol for IoT Authentication

Authors: Hiba A. Taresh
Pages: 27-33
Loading...
Loading...
Abstract

The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with different questions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of asset obliged gadgets that produce substantial volumes of information affects the security and protection of the included items. In this paper, we propose a lightweight protocol for IoT authentication which based on two algorithms LA1 and RA1 which is used for authentication and generating session key that is used for encryption.


Article
Automatic Iraqi Cars Number Plates Extraction

Authors: Safaa S. Omran --- Jumana A. Jarallah
Pages: 34-41
Loading...
Loading...
Abstract

License Plate Recognition (LPR) system becomes an important research issue in recent years due to its importance to wide ranges of commercial applications. The first and the most important stage for any LPR system is the localization of the number plate within the vehicle image. This paper presents a methodology for Iraqi cars number plates extraction from the vehicle image using two methods, the first one is morphological operations and the second method is edge detection. The main idea is to use these two different methods in such away so that the number plate of the vehicle can be extracted precisely. These algorithms can quickly and correctly detect and extract the number plate from the vehicle image although there was a little noise in the image. This paper also makes a comparison between the two methods of extraction in results. The software that used to build the systems is MATLAB R2014a.


Article
Design and Implement Chat Program Using TCP/IP

Loading...
Loading...
Abstract

LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of a company. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposed protocol facilitates information exchange among individuals by providing many communication options. It is a standalone application using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).

Keywords

LAN --- FTP --- UDP --- Chat --- TCP --- IP


Article
Image Hiding on High Frequency Speech Components Using Wavelet Packet Transform

Authors: Mohammed Nasser Hussein Al-Turfi
Pages: 48-52
Loading...
Loading...
Abstract

This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequency components of the speech signal with the data of the image where the high frequency speech components are separated and analyzed using the Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).

Keywords


Article
A Radial Basis Neural Network Controller to Solve Congestion in Wireless Sensor Networks

Authors: Maab Alaa Hussain
Pages: 53-62
Loading...
Loading...
Abstract

In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most important issues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routing in wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within an exact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayer perceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller (RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate traffic congestion along the selected route. A comparison study between the network with and without controller in terms of: traffic received to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of Radial Basis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.

Table of content: volume:44 issue:1