eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
1
10
10.30684/etj.v39i1B.343
168146
A Proposed Speaker Recognition Method Based on Long-Term Voice Features and Fuzzy Logic
Iman H. Hadi
1
Alia K. Abdul-Hassan
2
GSCOM, Baghdad, Iraq. iman.h.1439@gmail.com.
Computer Sciences Department, University of Technology, Baghdad, Iraq. 110018@uotechnology.edu.iq.
Speaker recognition depends on specific predefined steps. The most important steps are feature extraction and features matching. In addition, the category of the speaker voice features has an impact on the recognition process. The proposed speaker recognition makes use of biometric (voice) attributes to recognize the identity of the speaker. The long-term features were used such that maximum frequency, pitch and zero crossing rate (ZCR). In features matching step, the fuzzy inner product was used between feature vectors to compute the matching value between a claimed speaker voice utterance and test voice utterances. The experiments implemented using (ELSDSR) data set. These experiments showed that the recognition accuracy is 100% when using text dependent speaker recognition.
https://etj.uotechnology.edu.iq/article_168146_996f70bfa235ce83ecacf60c033c0324.pdf
Speaker identity
voice
frequency features
Fuzzy Vector
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
11
20
10.30684/etj.v39i1B.1363
168147
Eye Diseases Classification Using Back Propagation Artificial Neural Network
Hanaa M. Ahmed
1
Shrooq R. Hameed
2
Department of Computer Science, University of Technology, Baghdad, Iraq, 110113@uotechnology.edu.iq.
Department of Computer Science, University of Technology, Baghdad, Iraq, shrooq_rasheed@yahoo.com.
A human eye is a vital organ responsible for a person's vision. So, the early detection of eye diseases is essential. The objective of this paper deals with diagnosing of seven different external eye diseases that can be recognized by a human eye. These diseases cause problems either in eye pupil, in sclera of eye or in both or in eyelid. Color histogram and texture features extraction techniques with classification technique are used to achieve the goal of diagnosing external eye diseases. Hue Min Max Diff (HMMD) color space is used to extract color histogram and texture features which were fed to Back Propagation Artificial Neural Network (BPANN) for classification. The comparative study states that the features extracted from HMMD color space is better than other features like Histogram of Oriented Gradient (HOG) features and give the same accuracy as features extracted directly from medical expert recorded symptoms. The proposed method is applied on external eye diseases data set consisting of 416 images with an accuracy rate of 85.26315%, which is the major result that was achieved in this study.
https://etj.uotechnology.edu.iq/article_168147_58f30178b36c8fbbe6429aeeac618cf1.pdf
Back Propagation
Eye Diagnosis
feature extraction
Hue
Min
Max
Diff (HMMD) color space
Laws Feature
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
21
29
10.30684/etj.v39i1B.1577
168148
Determination Efficient Classification Algorithm for Credit Card Owners: Comparative Study
Raghad A. Azeez
1
University of Baghdad, Collage of Education for Human Science-ibn rushed Baghdad, Iraq raghad.azeez@ircoedu.uobaghdad.edu.iq
Today in the business world, significant loss can happen when the borrowers ignore paying their loans. Convenient credit-risk management represents a necessity for lending institutions. In most times, some persons prefer to late their monthly payments, otherwise, they may face difficulties in the loan payment process to the financial institution. Mainly, most fiscal organizations are considered managed and refined client classification systems, scanning a valid client from invalid ones. This paper produces the data mining idea, specifically the classification technique of data mining and builds a system of data mining process structure. The credit scoring problem will be applied using the Taiwan bank dataset. Besides that, three classification methods are adopted, Naïve Bayesian, Decision Tree (C5.0), and Artificial Neural Network. These classifiers are implemented in the WEKA machine learning application. The results show that the C5.0 algorithm is the best among them, it achieves 0.93 accuracy rates, 0.94 detection rates, 0.96 precision rates, and 0.95 F-Measure which is higher than Naïve Bayesian and Artificial Neural Network; also, the False Positive Rate in C5.0 algorithm achieves 0.1 which is less than Artificial Neural Network and Naïve Bayesian
https://etj.uotechnology.edu.iq/article_168148_d40d2a53deea3d91d1cd8402b7602511.pdf
artificial neural network
Bayesian
C5.0 algorithm
Classification
credit card
Data Mining
Decision tree
WEKA
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
30
40
10.30684/etj.v39i1B.1589
168149
Speaker Recognition Systems in the Last Decade – A Survey
Ahmed M. Ahmed
1
Aliaa K. Hassan
2
University of Technology, Baghdad, Iraq, 110172@student.uotechnology.edu.iq
University of Technology, Baghdad, Iraq, 110018@uotechnology.edu.iq
Speaker Recognition Defined by the process of recognizing a person by his\her voice through specific features that extract from his\her voice signal. An Automatic Speaker recognition (ASP) is a biometric authentication system. In the last decade, many advances in the speaker recognition field have been attained, along with many techniques in feature extraction and modeling phases. In this paper, we present an overview of the most recent works in ASP technology. The study makes an effort to discuss several modeling ASP techniques like Gaussian Mixture Model GMM, Vector Quantization (VQ), and Clustering Algorithms. Also, several feature extraction techniques like Linear Predictive Coding (LPC) and Mel frequency cepstral coefficients (MFCC) are examined. Finally, as a result of this study, we found MFCC and GMM methods could be considered as the most successful techniques in the field of speaker recognition so far.
https://etj.uotechnology.edu.iq/article_168149_619c0a236120a14817cda547f8e4806e.pdf
Speaker Recognition
speaker identification
MFCC
and Feature Extraction
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
41
52
10.30684/etj.v39i1B.1675
168150
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments
Turkan A. Khaleel
1
Department of Computer Engineering, Engineering College, University of Mosul, Nineveh, Iraq, turkan@uomosul.edu.iq
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased. Protecting cloud computing and providing security for its resources and users is one of the critical challenges. As a result, most users are afraid to use their resources, because many security problems must be met. For example, authentication and reliability are major security constraints and must be provided in a cloud computing environment. There is a wide range of authentication protocols in use, but the researcher has recommended the Kerberos protocol to represent and test it in a complex environment such as a mixed cloud environment. A model has been developed to implement Kerberos authentication in a hybrid cloud computing environment to securely access the cloud computing services provided. This model is represented using the OPNET Modeler 14.5 simulation system. The network efficiency was measured before and after the hacker. Findings presented in this research are supporting the ability of the Kerberos protocol to prevent illegal access to cloud computing services, whether from within the private cloud or the public cloud. While maintaining the efficient performance of the network.
https://etj.uotechnology.edu.iq/article_168150_d3200906a4943af5f90ebffc821830b2.pdf
Kerberos protocol
Hybrid Cloud Computing؛ Network Security
and Authentication
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
53
66
10.30684/etj.v39i1B.1684
168151
Motion Estimation for Gray Level Videos Using Different Block Matching Algorithms
Tareq Z. Hammood
1
Matheel E. Abdulmunim
2
Unit of Remote Sensing, College of Science, University of Baghdad, Baghdad, Iraq, tarik_z29@yahoo.com.
Department of Computer Science, University of Technology, Baghdad, Iraq, Dr.MatheelDargazli@uotechnology.edu.iq.
Motion Estimation (ME) is a very important operation in video coding. In order to reduce complexity of computations involved in ME and to increase quality of this process, many Block Matching Motion Estimation (BMME) Algorithms are proposed. The aim of this paper is to compare between these algorithms and find the best one. Seven BMME algorithms are used in this paper. The performance of each algorithm is evaluated for different types of motion to determine the best one of these algorithms. The evaluation is based on search points, and Peak Signal to Noise Ratio (PSNR). The simulation shows that Hexagonal Search is faster than all other Block Matching (BM) algorithms used in this paper regardless the type of video because it requires less number of search points to evaluate motion vectors for the video sequence. It requires 11.2424 average search point (SP) for small motions and 13.9708 for fast motions. It also gives a good quality that is close enough to the quality given by Full Search.
https://etj.uotechnology.edu.iq/article_168151_be3e46607bed350f327a1936b65a9211.pdf
Block matching
diamond search
hexagonal search
motion estimation
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
67
79
10.30684/etj.v39i1B.1741
168152
Using Texture Feature in Fruit Classification
Mauj H. Abd al karim
1
Abdulamir A. Karim
2
Department of Computer Science,University of Technology, Baghdad, Iraq, cs.19.69@grad.uotechnology.edu.iq
bDepartment of Computer Science,University of Technology, Baghdad, Iraq, 110004@uotechnology.edu.iq
Recent advances in computer vision have allowed wide-ranging applications in every area of life. One such area of application is the classification of fresh products, but the classification of fruits and vegetables has proven to be a complex problem and needs further development. In recent years, various machine learning techniques have been exploited with many methods of describing the different features of fruit and vegetable classification in many real-life applications. Classification of fruits and vegetables presents significant challenges due to similarities between layers and irregular characteristics within the class.Hence , in this work, three feature extractor/ descriptor which are local binary pattern (LBP), gray level co-occurrence matrix (GLCM) and, histogram of oriented gradient(HoG) has been proposed to extract fruite features , the extracted features have been saved in three feature vectors , then desicion tree classifier has been proposed to classify the fruit types. fruits 360 datasets is used in this work, where 70% of the dataset were used in the training phase while 30% of it used in the testing phase. The three proposed feature extruction methods plus the tree classifier have been used to classifying fruits 360 images, results show that the the three feature extraction methods give a promising results , while the HoG method yielded a poerfull results in which the accuracy obtained is 96%.
https://etj.uotechnology.edu.iq/article_168152_ba01e565b5a88098b7755d4a07fedeaf.pdf
HoG
GLCM
LBP
Decision tree
Fruit Classification
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
80
88
10.30684/etj.v39i1B.1805
168153
Influence of Foaming Agent Type on The Behavior of Foamed Concrete
Ruqaya F. Hamada
1
Awham M. Hameed
2
Department of Applied Sciences, University of Technology, Baghdad, Iraq. 100298@student.uotechnology.edu.iq
Department of Applied Sciences, University of Technology, Baghdad, Iraq.100155@uotechnology.edu.iq
In this work the desired aim is to study the effect of two various sorts of a foaming agents on the properties of foamed concrete to obtain high quality with a target density is nearly 1600 kg/m3. The standard samples were designed by employing two types of foam agent (FA), the first one is commercially named (EABSSOC foam agent, FA) while the second is the foam of detergent liquid (D) which known (Fairy). The results showed that the FA sample records the lower bulk density compared to the other types. The perfect mix which involved 1wt.% of (D) had higher values of the compressive strength 20.25MPa, 16.32MPa of the curing in water and air respectively and flexural strength (F.S) values were 6.89MPa,4.47MPa of the cured samples in (air, water) for various durations (7,14 and 28) days compared to the samples that contained 1and 0.8wt. % of FA. The obtained compressive strengths were 5.1MPa, 4.3MPa while the flexural strengths were 2.74MPa, 2.9MPa for the samples contained 1wt. %foam agent (FA) after the curing into water and air at the same duration. It is obvious that the addition of foam to the cement mortar paste imparts great characteristics as lightweight with flowability. These properties and others make it suitable for some applications, for example, a decrease of the dead load from the structure, thermal and acoustic insulating and use it in non-structural sections such as a wall.
https://etj.uotechnology.edu.iq/article_168153_068479cbed41918853bb2e826a723e0a.pdf
Foam agent
Detergent
Foam concrete
Lightweight concrete
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
89
100
10.30684/etj.v39i1B.1806
168154
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy
Suhaila N. Mohammed
1
Alia K. Abdul Hassan
2
Department of Computer Science, University of Technology, Baghdad, Iraq suhailan.mo@sc.uobaghdad.edu.iq
Department of Computer Science, University of Technology, Baghdad, Iraq, 110018@uotechnology.edu.iq
Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. The effect of the number of selected keyframes has been studied in this paper to find its impact on the final accuracy of the emotion recognition system. Dynamic and static information is employed to select the most effective key-frames of the facial video with a short response time. Firstly, the absolute difference between the successive frames is used to reduce the number of frames and select the candidate ones which then contribute to the clustering process. The static-based information of the reduced sets of frames is then given to the fuzzy C-Means algorithm to select the best C-frames. The selected keyframes are then fed to a graph mining-based facial emotion recognition system to select the most effective sub-graphs in the given set of keyframes. Different experiments have been conducted using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the results show that the proposed method can effectively capture the keyframes that give the best accuracy with a mean response time equals to 2.89s.
https://etj.uotechnology.edu.iq/article_168154_07da5014e98d2e15c778cd630a4f8ea5.pdf
Facial expressions Fuzzy C-Means algorithm Graph-based Substructure Pattern (gSpan) algorithm
Key-frame selection
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
101
116
10.30684/etj.v39i1B.1839
168155
License Plate Tilt Correction: A Review
Nada N. Kamal
1
Enas Tariq
2
Department of Computer Science, University of Technology-Iraq, Baghdad, Iraq, 110136@uotechnology.edu.iq
Department of Computer Science, University of Technology-Iraq, Baghdad, Iraq, 110038@uotechnology.edu.iq
Tilt correction is an essential step in the license plate recognition system (LPR). The main goal of this article is to provide a review of the various methods that are presented in the literature and used to correct different types of tilt that appear in the digital image of the license plates (LP). This theoretical survey will enable the researchers to have an overview of the available implemented tilt detection and correction algorithms. That’s how this review will simplify for the researchers the choice to determine which of the available rotation correction and detection algorithms to implement while designing their LPR system. This review also simplifies the decision for the researchers to choose whether to combine two or more of the existing algorithms or simply create a new efficient one. This review doesn’t recite the described models in the literature in a hard-narrative tale, but instead, it clarifies how the tilt correction stage is divided based on its initial steps. The steps include: locating the plate corners, finding the tilting angle of the plate, then, correcting its horizontal, vertical, and sheared inclination. For the tilt correction stage, this review clarifies how state-of-the-art literature handled each step individually. As a result, it has been noticed that line fitting, Hough transform, and Randon transform are the most used methods to correct the tilt of a LP.
https://etj.uotechnology.edu.iq/article_168155_45c168536fd83f7cb275f19d0512b39f.pdf
Angle
License Plate
rotation
Skew
Survey
Tilt Correction
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
117
128
10.30684/etj.v39i1B.1903
168156
A New Hybrid Technique for Face Identification Based on Facial Parts Moments Descriptors
Shaymaa M. Hamandi
1
Abdul Monem S. Rahma
2
Rehab F. Hassan
3
Department Computer Science, University of Technology, Baghdad, Iraq, 111797@student.uotechnology.edu.iq
Department Computer Science, University of Technology, Baghdad, Iraq, 110003@uotechnology.edu.iq
Department Computer Science, University of Technology, Baghdad, Iraq , 110019@uotechnology.edu.iq
Robust facial feature extraction is an effective and important process for face recognition and identification system. The facial features should be invariant to scaling, translation, illumination and rotation, several feature extraction techniques may be used to increase the recognition accuracy. This paper inspects three-moment invariants techniques and then determines how is influenced by the variation which may happen to the various shapes of the face (globally and locally) Globally means the whole face shapes and locally means face part's shape (right eye, left eye, mouth, and nose). The proposed technique is tested using CARL database images. The proposal method of the new method that collects the robust features of each method is trained by a feed-forward neural network. The result has been improved and achieved an accuracy of 99.29%.
https://etj.uotechnology.edu.iq/article_168156_16d06617a5f49184adf5fd200760584b.pdf
artificial neural network
Affine moments
face recognition
Invariant Moments
Shape descriptor
Zernike moments
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
129
140
10.30684/etj.v39i1B.1905
168157
Age Estimation in Short Speech Utterances Based on Bidirectional Gated-Recurrent Neural Networks
Ameer A. Badr
1
Alia K. Abdul-Hassan
2
Department of Computer Science, University of Technology, Baghdad, Iraq. College of Managerial and Financial Sciences, Imam Ja’afar Al-Sadiq University, Salahaddin, Iraq. cs.19.53@grad.uotechnology.edu.iq
Department of Computer Science, University of Technology, Baghdad, Iraq. 110018@uotechnology.edu.iq
Recently, age estimates from speech have received growing interest as they are important for many applications like custom call routing, targeted marketing, or user-profiling. In this work, an automatic system to estimate age in short speech utterances without depending on the text is proposed. From each utterance frame, four groups of features are extracted and then 10 statistical functionals are measured for each extracted dimension of the features, to be followed by dimensionality reduction using Linear Discriminant Analysis (LDA). Finally, bidirectional Gated-Recurrent Neural Networks (G- RNNs) are used to predict speaker age. Experiments are conducted on the VoxCeleb1 dataset to show the performance of the proposed system, which is the first attempt to do so for such a system. In gender-dependent system, the Mean Absolute Error (MAE) of the proposed system is 9.25 years, and 10.33 years, the Root Mean Square Error (RMSE) is 13.17 and 13.26, respectively, for female and male speakers. In gender_ independent system, the MAE of the proposed system is 10.96 years, and the RMSE is 15.47. The results show that the proposed system has a good performance on short-duration utterances, taking into consideration the high noise ratio in the VoxCeleb1 dataset.
https://etj.uotechnology.edu.iq/article_168157_bf130d558709efce9a3bb4f50337cb5a.pdf
Gated-Recurrent Unit (GRU)
Linear Discriminant Analysis (LDA)
Speaker age estimation
Statistical functional
VoxCeleb1 dataset
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
141
149
10.30684/etj.v39i1B.1919
168158
Fracture Toughness of Glass infiltrated (3Y-TZP/Al2O3) Composite
Sara N. Ibrahim
1
Shihab A. Zaidan
2
Mudhafar A. Mohammed
3
Department of Applied Sciences, University of Technology, Baghdad, Iraq, 102180@student.uotechnology.edu.iq
Department of Applied Sciences, University of Technology, Baghdad, Iraq, 100160@uotechnology.edu.iq
Department of Applied Sciences, University of Technology, Baghdad, Iraq, 100167@uotechnology.edu.iq
Five different 3 mol.% yttria-tetragonal zirconia polycrystals/alumina (3Y-TZP/Al2O3) -glass specimens have been fabricated by the glass infiltration method. graphite additives were added to the (3Y-TZP/20Wt.%Al2O3) to obtain porous structure. The ATZ (Alumina Toughened Zirconia) skeleton have prepared by the normal compaction method. The specimen had been infiltrated by the glass (18Wt.% lithium hydroxide, 72 wt. % feldspar, and 10Wt.% nano Titanium oxide) at 1185ᵒC. Results showed that the porosity of (3Y-TZP/Al2O3) composite was increased while bulk density decreased with increasing graphite additives. The elastic modulus of (3Y-TZP/Al2O3)-glass was decreased (159-109GPa) with increasing the amount of glass infiltrated. Hardness was constant for all the specimens in value of (5.66 GPa), while increment of materials fracture toughening was due to the increasing the glass weight fraction, the kIc was lied between (0.53-1. 54MPa.m1/2). The glass infiltrated (3Y-TZP/Al2O3) process was successfully increased the fracture toughness by penetrated different amounts of glass into the (3Y-TZP/Al2O3) structure.
https://etj.uotechnology.edu.iq/article_168158_55c67a2383434cfe1e8dbea1b3f0ea72.pdf
ATZ-glass composite Fracture toughness
3Y-TZP
Brittleness index
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
150
158
10.30684/etj.v39i1B.1921
168159
A Study of the Effect of Starch Content on the Water Absorption of PVA/starch Blends
Bushra H. Musa
1
Nahida J. Hameed
2
Applied Sciences department, Materials Science, University of Technology, Baghdad, Iraq 100137@uotechnology.edu.iq
Applied Sciences department, Materials Science, University of Technology, Baghdad, Iraq, 100129@uotechnology.edu.iq
The present work aims to study physical tests such as the water absorption tests of PVA; PVA/corn starch blends at different mass percent (25, 30, 35, 40, and 50%) of corn starch after immersion in distilled water for ten minutes. The blends were also characterized by FTIR analysis, and an optical microscope. Casting method used to prepare samples. The results of water absorption exhibited that the weight losses of the sample increases the starch content rises in the PVA matrix. Also, it was found the highest value of the swelling ratio % at (50% PVA /50% Starch) blend, while minimum values of the swelling ratio % at (75%PVA /25%Starch) blend and pure PVA film. It was observed from optical microscope that the starch granules disperse well at 25 and 30 wt.% of the starch in the blend films. Nevertheless, clustering could be observed in the polymer blend at 35, 40, and 50 wt.% of starch component. It was shown that porous and spherical voids after the samples were immersed in distilled water.
https://etj.uotechnology.edu.iq/article_168159_581b133efb5fd49d7962ccef2565598d.pdf
PVA
corn starch
water absorption test
polymer blend
FTIR
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
159
164
10.30684/etj.v39i1B.1944
168160
Detection Face Parts in Image Using Neural Network Based on MATLAB
Shahad L. Galib
1
Fouad S. Tahir
2
Asma A. Abdulrahman
3
Department of Applied Sciences, University of Technology, Baghdad, Iraq, as.18.29@grad.uotechnology.edu.iq
Department of Applied Sciences, University of Technology, Baghdad, Iraq, 11015@uotechnology.edu.iq
Department of Applied Sciences, University of Technology, Baghdad, Iraq, 100243@uotechnology.edu.iq
Recently, face recognition system (FRS) is implemented in different applications including a range of vital services like airports and banking systems for security purposes. Therefore, deployed surveillance systems have been established which led to the urgent need to develop a vital face recognition system. In this work, a new algorithm was proposed for recognition of the face, personal and color images by training the convolutional neural network using the MATLAB program to build a new program for detection of the face, then building a separate program to discover the lips, nose, and eyes, New methods were explored to analyze the main and independent components to improve face detection, which is considered one of the important techniques in this work using neural networks and implementation through the MATLAB program.
https://etj.uotechnology.edu.iq/article_168160_40982ccdde6f71b6c8c024ba6a05929e.pdf
Convolutional Neural Networks
Face detection
Matlab
Eyes
mouth
Nose
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
165
174
10.30684/etj.v39i1B.1950
168161
Survey of Recent Video Watermarking Techniques
Taisir N. Hummadia
1
Nidaa F. Hassanb
2
Computer Science Department, University of Technology, Baghdad, Iraq, cs.19.41@grad.uotechnology.edu.iq
Computer Science Department, University of Technology, Baghdad, Iraq, 110020@uotechnology.edu.iq
With the development of the Internet coupled with expanding the accessibility of multimedia, various copyright issues have resulted. Several researchers have been working on watermarks to provide the security, durability, and a perception of multimedia. This paper a review of some recent works is presented related to video watermarking techniques, this study focuses on the pros and cons of recent video watermarking, areas of application, and the different types and attacks that are standing against these watermarking techniques. The results obtained from this study showed that watermark techniques based on the transfer domain, are more popular than those of the spatial domain.
https://etj.uotechnology.edu.iq/article_168161_85d9f87c7484c014e33c5d58ae58952a.pdf
Digital watermarking
Digital Video Watermarking
Copyright Protection
Watermarking Techniques
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
175
183
10.30684/etj.v39i1B.1623
168162
Intelligent Feature Selection Methods: A Survey
Noor Jameel
1
Hasanen S. Abdullah
2
Department of Computer Science, University of Technology, Baghdad, Iraq, 110443@uotechnology.edu.iq
Department of Computer Science, University of Technology, Baghdad, Iraq, 110014@uotechnology.edu.iq
Consider feature selection is the main in intelligent algorithms and machine learning to select the subset of data to help acquire the optimal solution. Feature selection used an extract the relevance of the data and discarding the irrelevance of the data with increment fast to select it and to reduce the dimensional of dataset. In the past, it used traditional methods, but these methods are slow of fast and accuracy. In modern times, however, it uses the intelligent methods, Genetic algorithm and swarm optimization methods Ant colony, Bees colony, Cuckoo search, Particle optimization, fish algorithm, cat algorithm, Genetic algorithm ...etc. In feature selection because to increment fast, high accuracy and easy to use of user. In this paper survey it used the Some the swarm intelligent method: Ant colony, Bees colony, Cuckoo search, Particle optimization and Genetic algorithm (GA). It done take the related work for each algorithms the swarm intelligent the ideas, dataset and accuracy of the results after that was done to compare the result in the table among the algorithms and learning the better algorithm is discuses in the discussion and why it is better. Finally, it learning who is the advantage and disadvantage for each algorithms of swarm intelligent in feature selection.
https://etj.uotechnology.edu.iq/article_168162_97f2824a97ac255b447ed54f917058f7.pdf
Feature selection
Intelligent Feature Selection Survey
Intelligent Applications. Swarm intelligence
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
184
196
10.30684/etj.v39i1B.1689
168163
A Proposal Video Encryption Using Light Stream Algorithm
Ataa R. Alawi
1
Nidaa F. Hassan
2
Computer Sciences, University of Technology, Bagdad-Iraq, ataarasol5@gmail.com
Computer Sciences, University of Technology, Bagdad-Iraq, 110020@uotechnology.edu.iq
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed time, thus to speed up this process, feature detection operator (FAST) is used to encrypt key points result from FAST operator, in addition key points from this is increased to optimized between speed and robustness of proposed algorithm. In evaluation process, some of measuring quality factors MSE, PSNR, Correlation, NPCR, UACI and entropy are specified for evaluating and comparing between two suggested encryption algorithms which gave good result in encryption process (ChaCha and ChaCha with FAST Enhancement). Experimental results have discovered that the current projected has less encrypting time and better encrypting influence
https://etj.uotechnology.edu.iq/article_168163_628abc0923f3e01f835f519a551612cb.pdf
Video encryption
Video Security
ChaCha
stream cipher
Features Detectors Operators
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
197
202
10.30684/etj.v39i1B.1880
168164
Preparation ZnO nanoparticles with Different Concentration by Laser Ablation in Liquid
Ghufran S. Jaber
1
Khawla S. Khashan
2
Maha J. Abbas
3
Department of Applied Science, University of Technology, Baghdad, Iraq, as.18.03@grad.uotechnology.edu.iq
Department of Applied Science, University of Technology, Baghdad, Iraq, 100082@uotechnology.edu.iq
Department Orthodontic, University of Technology, College of Dentistry, Baghdad, Iraq, dr.maha.jamal.abbas@uomustansiriyah.edu.iq.
The effects of varying laser pulse numbers on the fabricated of ZnONPs by pulsed laser ablation in deionized water of Zn-metal are investigated. The Nd: YAG laser at energy 600mJ prepared three samples by change the laser pulse number (100, 150, and 200). The results were collected and examined using an electron scanning microscope, XRD – diffraction, and transmission electron microscope. The result revealed the colloidal spherical shape and the homogeneous composition of the ZnO NPs. The nanoparticles resulted in different concentrations and sized distributions by changing the pulse number of a laser. The average particle size and the mass concentration of particle size increase with an increasing number of laser pulses by fixed the laser energy.
https://etj.uotechnology.edu.iq/article_168164_2167ed976bd3ed67e2fd01de91df65ae.pdf
Pulse Laser ablation in liquid (PLAL)
Zinc Oxide (ZnO)
Nano-particles
Nd:YAG laser
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
203
208
10.30684/etj.v39i1B.174
168165
Data Center Enhancement by Server Resources Utilization
Haider A. Ghanem
1
Rana F. Ghani
2
Mohammed N. Fadhil
3
Department of Computer Science, University of Technology, Baghdad, Iraq, Haider8889@Gmail.com
Department of Computer Science, University of Technology, Baghdad, Iraq, 110016@uotechnology.edu.iq
Department of Computer Science, University of Technology, Baghdad, Iraq, mohammad.n.fadhil@uotechnology.edu.iq
Data centers are the main nerve of the Internet because of its hosting, storage, cloud computing and other services. All these services require a lot of work and resources, such as energy and cooling. The main problem is how to improve the work of data centers through increased resource utilization by using virtual host simulations and exploiting all server resources. In this paper, we have considered memory resources, where Virtual machines were distributed to hosts after comparing the virtual machines with the host from where the memory and putting the virtual machine on the appropriate host, this will reduce the host machines in the data centers and this will improve the performance of the data centers, in terms of power consumption and the number of servers used and cost
https://etj.uotechnology.edu.iq/article_168165_96378e4314cfa915c8843703f63e6fdd.pdf
Data Center
Horizontal Scaling
Vertical Scaling
Virtual Machine
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
209
221
10.30684/etj.v39i1B.1755
168166
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Raya W. Abd Aljabar
1
Nidaa F. Hassan
2
University of Technology, Baghdad, Iraq, cs.19.66@grad.uotechnology.edu.iq
University of Technology, Baghdad, Iraq, 110020@uotechnology.edu.iq
Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, Encryption VoIP based on Generated Biometric Key for RC4 Algorithm is proposed to encrypt the voice data before transmitting it over the network. The system uses a stream algorithm based on RC4 encryption with the new method of biometrics based Key generation technique. This system has generated complex keys in offline phase which is formed depend on features extracted using Linear Discernment Analysis (LDA) from face images. The experimental work shows that the proposed system offers secrecy to speech data with voice cipher is unintelligible and the recovered voice has perfect quality with MSR equal to zero and PSNR equal to infinity.
https://etj.uotechnology.edu.iq/article_168166_652d614a300d1151e901526fbb42a925.pdf
VoIP
Cryptography
stream cipher
Biometric cryptosystem
Linear Discriminant Analysis (LDA)
RC4
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
222
230
10.30684/etj.v39i1B.1719
168167
Smart Door for Handicapped People via Face Recognition and Voice Command Technique
Hanaa M. Salman
1
Rana T. Rasheed
2
University of Technology, Computer Science Department, Baghdad, Iraq, 110113@uotechnology.edu.iq
University of Technology Computer Science Department, Baghdad, Iraq, cs.19.57@grad.uotechnology.edu.iq
Smart home indicates an application for different technological implementations, it could indicate any system which controls the door lock and several other devices. Facial identification which is an important section to achieve surveillance and safety, especially for handicapped people, can be considered as one of the ways that deal with biometrics and performed to identify facial images via utilizing fundamental features of the face. A Raspberry Pi-based face recognition system using conventional face detection and recognition techniques is going to be supplied, so the method in which image-built biometrics uses a Raspberry Pi is described. The aim of the paper here can be considered as transferring face recognition to a level in which the system can replace the utilizing of RF I-Cards and a password to access any system of security and making the system alive and protect the door from being open by hackers, especially by using the picture of an authorized person, we make the raspberry pi turn off and cannot turn on only by a command from the authorized person's mobile. The result of the presented proposal is a system that uses face recognition by utilizing OpenCV, Raspberry Pi, and it functions on an application of Android, and this system percentage becomes 99.63%. It should be cost-effective, of high performance, secured, and easy to use, which can be used in any smart home application.
https://etj.uotechnology.edu.iq/article_168167_72c0cf03aed271d6027d267af03ffbdd.pdf
Smart home
face recognition
Face detection
handicapped people
Raspberry pi
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
231
242
10.30684/etj.v39i1B.1574
168168
An Improved Method for Combine (LSB and MSB) Based on Color Image RGB
Sally A. Mahdi
1
Department of Computer Sciences, University of Technology, Bagdad, Iraq, cs.19.68@grad.uotechnology.edu.iq
Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.
https://etj.uotechnology.edu.iq/article_168168_82c4083c48a08dbefb737d8d93e42311.pdf
information hiding
Steganography
LSB
MSB
Secret key
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
243
251
10.30684/etj.v39i1B.1510
169179
بحث
A New Proposed Coding Method for Steganography Purpose
Suhad Kadhem
110102@uotechnology.edu.iq
1
Computer Science Department, University of Technology - Iraq
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission. Coding is a method to represent the data in another shape, so a high level of security is achieved by using coding and hiding data together. The proposed method is a hybrid between coding and hiding, but this paper focuses on proposed a data coding part only, such that the cover text (that used for information hiding) will be used to extract private information between the sender and the receiver for coding process, and the output of the proposed coding method can be used for information hiding process. Apply the proposed coding method will provide a high level of security and complexity and produce ASCII of non-printed characters which can be employed for steganography purposes to obtain complete similarity between secret text and cover text.
https://etj.uotechnology.edu.iq/article_169179_e6b4601bedea30ef0273a3dfb6c98c99.pdf
Coding
Run Length Encoding
Move to Front
Non-printed characters
Steganography
eng
University of Technology-Iraq
Engineering and Technology Journal
1681-6900
2412-0758
2021-03-01
39
1B
252
261
10.30684/etj.v39i1B.1552
169182
بحث
Effect of CO2 Laser on Glazed Zircon Surface Complemented by ZrO2 Oxide
Zahraa Salman
zahraamer8866@gmail.com
1
Kadhim Hubeatir
2
Shihab Zaidan
3
Department of Laser Engineering and Electronic Optics, University of Technology - Iraq
Department of Laser Engineering and Electronic Optics, University of Technology - Iraq
Department of Applied Sciences, University of Technology - Iraq
In this paper, the effect of CO2 laser on glaze-dental Zirconia ceramics after adding ZrO2 nanoparticles to glaze is introduced, and its improvement methods are studied. Specimens have been prepared using CAD/CAM dental machines and sintered at 1530o-C. Then the surface was glazed with VITA glaze plus (5% and 10%) Nano ZrO2. A 15W continuous CO2 laser was used as the indicator power to irradiate the glaze layer. The main phase of the ceramic substrate is tetragonal Zirconia, and the alumina content in the corundum phase is a certain percentage. The appearance of the varnish on the ceramic substrate changes the X-ray diffraction pattern through the appearance of new phases, which changes the crystallite size and the percentage of lattice strain. The range of grain size measured by atomic force microscopy was 88.46 nm to 62.18nm. In addition, the surface roughness was changed due to the appearance of crystal cores and grain growth. In addition, the addition of ZrO2 and laser irradiation changed the residual stress on the surface, which was reflected in the hardness value increased from 575 kg/mm2 to 1215 kg/mm2 after the laser treatment with the addition of 5% ZrO2. Generally, in terms of the structure and hardness of the surface of the glaze layer, the addition of 5% ZrO2 is better than 10%. SEM tests also showed no cracks in the central part of the treated area. These characteristics increase hardness.
https://etj.uotechnology.edu.iq/article_169182_307d71395f1a8e868eaea37e897dae6d.pdf
CAD/CAM؛ Dental ceramics؛ CO2laser؛ Zirconia؛ Glazing؛ Residual stress
grain size