Volume 9, Issue 1, Spring 2017, Page 1-168

On coc-r-compact spaces

Raad Aziz Hussain Al-Abdulla; Fadhel Attala Shneef

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 1-11

In this.work, We will study a.new class of popularizer open.sets called.coc-r-open sets and we will study its properties too, also we will study coc-r-compact, I-Compact space and the relationship between them, finally we have to get some results that show the relationship between these spaces through some of the theorems obtained by using coc-r-open sets.

Study of Some Dynamical Concepts in General Topological spaces

Ihsan Jabbar Kadhim; Sema Kadhim Jebur

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 12-22

In this, paper, some, famous, dynamical, concepts, such, as, sensitive, transitive,, mixing, and equicontinuous, are studied, in a topological, G-space, and, the essential, properties, of these, maps, are proved. Furthermore, , the, concept, of Devaney's, chaotic, maps, in topological G-spaces, is studied.

Some Results on Soft Seminorms

Kholod M. Hassan; Noori F. AL-Mayahi

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 23-34

Our goal in this work , is to show that a family of soft seminorms on a soft linear space SL(X ̃) induces a soft topology on that space and to find the relationship between another type of a soft functional called soft Minkowski's functional on a soft linear space over the soft scalar field.

On Semi –Complete Bornological Vector Space

Fatma Kamil Al-Basri

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 40-48

The definition of semi-convergence of nets, semi-cauchy nets in convex bornological vector space and semi-complete bornological vector space and the relationship among these concepts have been studied in this paper. Also, we introduce some theorems of these concepts and get some results. The main results of this study are of considerable interest in many situations.

Wrist and Palm Vein pattern recognition using Gabor filter

Mohammed Hamzah Abed

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 49-60

Wrist and palm vein pattern can be considering as a promising biometric technique for identification, through the study of the pattern of blood vessels that visible from the skin. This kind of recognition is very important for many reasons; vein exists inside of the human body makes it difficult to change pattern like shift the position of vein from part to another, unlike another method of techniques of recognition. In this paper work wrist and palm vein are studied for identification and verification, this work divided into three phases preprocessing, features extraction and recognition. in preprocessing phase apply resize and image “enhancement” using “CLAHE and 2-D Gaussian high pass filter”, the features of each image are extracted by using Gabor filters. LDA and PCA are used to minimize the dimension of the features set. For vein image, identification used Euclidean distance to measure the similarity. The average CRR of vein palm in proposed work is 94.49% and the average CRR of vein wrist is 92.33.

A novel Approach to improve biometric authentication using Steerable-Locality Sensitive Discriminant Analysis

Ali Mohsin Al-juboori

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 61-70

With the increasing needs in security systems, palm vein authentication is one of the important and reliable solutions for identity security for biometrics based authentication systems. Palm vein, as a biological characteristic of an individual, has been increasingly utilized for personal authentication in advanced security applications. Palm vein patterns are a unique attribute of everyone and can therefore be used as a biometric characteristic. The human palm vein pattern is extremely complex and it shows a huge number of vessels. The biometric information is located inside the human body, and therefore it is protected against forgery and manipulation. In the proposed method, the Multilevel Gaussian-Second-Derivative (MGSD) is proposed for enhancement the palm vein images. Secondly, a new feature extraction method based on Steerable filter and Locality Sensitive Discriminant Analysis is proposed called Steerable - Locality Sensitive Discriminant Analysis (SLSDA). Finally, the Correlation Distance method is proposed for verify the tested palm vein. The EER to the proposed authentication system is 0.1087%.

Networks Security and data transmission using Multi-protocol Label Switching (MPLS) technology

Mustafa Abdalrassul Jassim

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 71-81

Considered the MPLS network is the future for all the needs and applications of networks and most efficient .With the development of companies and organizations to keep pace with the ever-changing business climate, companies’ networking needs are becoming more dynamic. Their networks must be able to transfer sophisticated applications quickly and efficiently while minimizing costs. MPLS is a technology that can be very beneficial to companies and this paper outlines what MPLS is, the benefits that MPLS delivers and how MPLS can satisfy companies -networking requirements. But the problem is when they went all the companies and service providers to the Internet Protocol IP, it has become important to find a more efficient way approve of this type of approach, MPLS simplifies the network infrastructure by allowing the improvement of multiple technologies and applications such as voice, video and data. MPLS provides enhanced security & high availability through the below-mentioned theories & analysis we can see that the MPLS is faster than traditional routing technique. If we can improve hardware facilities and software platform by real-time routers then we can notice the significant difference. This is indicated by the work paper from improving the performance of data transfer to ensure confidentiality and speed of transfer.

Abnormality Detection using K-means Data Stream Clustering Algorithm in Intelligent Surveillance System

Abdulamir A. Karim; Narjis Mezaal Shati

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 82-98

In this research work a k-Means clustering technique utilized in a new data stream clustering method used in abnormal detection system. This system implies the use of a set of features (such as: distance, direction, x-coordinate, y-coordinate) extracted from set of pairs of interest point that obtained using HARRIS or FAST detector from the frames of video clips in two publically available datasets, the first UCSD pedestrian dataset (ped1 and ped2 datasets), and the second VIRAT video dataset. The results indicated that using HARRIS detector achieved detection rate 1% with 6% false alarms by using UCSD (Ped1) dataset, 10.75% detection Rate with 10% false alarm rate by using UCSD (Ped2) dataset, and 5% detection rate with 40% false alarms by using VIRAT dataset. While for FAST detector, the achieved detection rates are 0.5%, 10.75%, and 4.08% while the false alarm rates are 5%, 10.50%, and 45.92% by using UCSD (Ped1), UCSD (Ped2), and VIRAT datasets respectively.

Anomaly Detection by Using Hybrid Method

Mohamed H. Ghaleb

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 99-107

In this paper a new approach has been designed for Intrusion Detection System (IDS). The detection will be for misuse and anomalies for training and testing data detecting the normal users or attacks users.
The method used in this research is a hybrid method from supervised learning and text recognition field for (IDS). Random Forest algorithm used as a supervised learning method to choose the features and k-Nearest Neighbours is a text recognition algorithm used to detect and classify of the legitimate and illegitimate attack types.
The experimental results have shown that the most accurate results is that obtained by using the proposed method and proved that the proposed method can classify the unknown attacks. The results obtained by using benchmark dataset which are: KDD Cup 1999 dataset.

Multi-Authority System based Personal Health Record in Cloud Computing

Ghassan Sabeeh Mahmood; Taha Mohammed Hasan; Aymen Mudheher Badr

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 108-116

Personal Health Records (PHRs) is service for health information interchange. Patients can create, control, and exchange their health information. PHRs are outsourced to be stored in the cloud. However, there have been serious privacy concerns about cloud service as it may expose user’s data like PHRs to those cloud service providers or unauthorized users. To overcome these challenges, a cloud based PHRs for exchange PHRs among multiple users is proposed. In the proposed system, patients can encrypt their PHRs and store them on the cloud. Furthermore, patients can maintain control over access to their PHRs by assigning fine grained access control. To achieve fine grained access, the proposed PHRs are divided into the personal domain (PSDs) and public domain (PUDs). To ensure security in a cloud based PHRs, Multi-authority based weighted attribute encryption model and Attributed-based access control for the Multi authority model are implemented in the PSDs and PUDs, respectively. The proposed model based on PHRs improves the efficiency of the system in terms of encryption, decryption. Also, the proposed system has proven to be collusion resistant and enhancing the security of PHRs users in a multi owner environment.

A Simulation of a Networked Video Monitoring System Using NS2

Muntasir Jaber Jawad Al-Asfoor

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 117-131

The work presented in this paper has focused on the simulation of video streaming over a hybrid (wired-wireless) network for the purpose of monitoring. A simulation scenario has been designed and implemented using the network simulator (NS2) to realise the network system. The system consists of 5 nodes, 3 of which are video cameras that play two major roles. First of all, capturing moving objects within a radius of 20 metres and secondly to work as a wireless routers within the network. Furthermore, the two nodes have different purposes; the fourth node works as an access point to connect the cameras which are wirelessly connected together and with the access point. However, the fifth node performs the job of a server which is wired-connected to the access point and has the video encoding/decoding and quality of service (QoS) calculations routines.The system has been implemented and tested under simulation environment and two types of assessment have been performed. The first assessment was to measure the quality of service from a networking point of view for which three factors have been used; namely: Packet Loss, End-to-End Throughput and Jitter. The second assessment was to measure the quality of the received videos using Peak signal to Noise Ratio "PSNR" measure. For simulation purposes 3 videos of type H.264 have been used to represent the 3 cameras streams. Evalvid framework is used to transform them into a streaming format to facilitate the evaluation of video streaming over a simulated network. The simulation process has shown a promising results in both network's QoS and video quality with the average packet loss of 0.04%, average time delay of 0.9sec and average jitter of 0.001951. More after, the video quality has shown an average "PSNR" of 30.13 when 1530 frames have been transmitted with STDV of 6.85.

Steganography: Applying LSB Algorithm to Hid Text in Image

Ali Fattah Dakhil

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 132-143

The technique and procedure of concealing correspondences between two resources is called Steganography. In fact, steganography has a major function and plays a significant role in security and data protection. It applies a technique in which making such communication is stashed by hiding data inside other media. There are three components of Steganography; cover-media which holds the secrete message, also the secrete message and third stegano-media which is the final result of combining the secrete message and hosting media. The most useful algorithm that implemented here is the Least Significant Bit (LSB). Images are the objective media used here to hide a text inside it using LSB algorithm.

Face Recognition By Using Nearest Feature Midpoint Algorithm

Tameem Hameed Obaida

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 144-152

Good facial recognition system is a system which can handle variation that arise when making a face image. These variation can include facial expressions, accessories that are used, the level of illumination and direction of image acquisition. Variation will be captured by the virtual lines are made of at least two prototypes in a class. The virtual line will generalize the variation that may occur on the second prototype. Face identification process will be done by finding the shortest distance between the face that will be recognized by all the Variation result of extrapolation and interpolation prototype in each class. Implementation of this method can achieve accuracy rates of more than 90% to the execution time of 0.5 seconds under optimal condition.

Content-Based Audio Retrieval by using Elitism GA-KNN Approach

Sarah Hussein Toman; Muna Ghazi Abdul Sahib; Zinah Hussein Toman

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 153-168

The digital audio became very popular and important in a computer user experience. The increasing amounts of audio data requires improvement, new methods and algorithms for processing this information. In this paper, our approach proposed the GA-KNN approach (Genetic Algorithm with K-Nearest Neighbor as fitness function) for content-based audio retrieval. The input is an audio file (query) and the output is a list of audio files ranked by their similarity. The system first extracts the features from an audio database and audio query. The query pattern is considered as a boundary for comparison. Then, the initial population in a genetic algorithm is constructed from a database containing all audio features. To improve the results, this paper uses Cosine measure in the genetic algorithm, and an improved selection method selection method to prevent the fittest chromosomes from being wasted in the new population by adding an Elitism feature, using 4% Elitism count. Furthermore, we proposed a new crossover method (Close Up-Feature Crossover) to create a new offspring by comparison between two audio patterns to query pattern. Finally, we evaluated our approach using a well-known audio database, which contains 409 sound samples of 16 classes to give 0.71475 as a precision of the audio retrieval.

The use of factor analysis to identify the most important factors influencing the migration Of Iraqi youth :A statistical study of the Status the migration of young people in Diwaniyah province.

Saif Hosam Raheem

Journal of Al-Qadisiyah for Computer Science and Mathematics, Volume 9, Issue 1, Pages 1-11

We touched on the search to find out the main factors that lead to the migration of young Iraqis and come up with appropriate solutions to address the problem of immigration, to determine the Goal of the study the use of a sample size of 150 Iraqi young from Diwaniyah province, where used a questionnaire form to collect the data. 15 questions were distributed on three axes ( economic, political, social) and use SPSS program to analyze data.