Table of content

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING

المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم

ISSN: 18119212
Publisher: University of Technology
Faculty: Control and Systems Engineering
Language: English

This journal is Open Access

About

The Iraqi Journal of Computers,Communications,Control and Systems Engineering (IJCCCE) is a quarterly engineering journal issued by the University of Technology /Baghdad ,aiming to enrich the knowledge in computer,communication and control fields .

Loading...
Contact info

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING
University of Technology P.O.BOX. 18310
Baghdad,Iraq .
ijccce_uot@uotechnology.edu.iq
ijccce_uot@yahoo.com

Table of content: 2017 volume:17 issue:1

Article
Implementation of Wireless Area Network for Patient Monitoring System

Authors: Hassan J. Hassan --- Noor Kadhim Hadi
Pages: 1-9
Loading...
Loading...
Abstract

There are many critical cases in which the patients need continuous monitoring by the medical staff. Implementing wireless sensor network in medical field helps the medical staff to monitor the patients remotely. This system is designed to collect the patient’s physiological parameters, and store them in the database. The doctor monitors the patient continuously in real time. In this project the biomedical sensor nodes used are temperature and heart rate sensors; Arduino UNO is used as a microcontroller for data processing, and then the messages are transmitted to the base station via Bluetooth wireless technology. The Raspberry Pi is used as a system personal server. The results, reports and other information related to the patients are displayed in website pages which are suitable for the desktop, Personal Digital Assistance (PDA) and mobile devices.


Article
Drip Irrigation Scheduling System Using Sensor Network

Loading...
Loading...
Abstract

The agriculture is vulnerable and sensitive to climate changes. These changes reduce the production while encouraging the growth of bush, which lead to water consumption extravagantly. In this paper, we proposed an automatic drip irrigation system based on calculating the required crop water and irrigation depth. The aim of the proposed system is to automatically compute irrigation scheduling of certain crop according to a crop type and climatological conditions. This system includes two parts: hardware and control center. The sensors send their real-time readings of the soil moisture and climatic information to the monitoring part of the system wirelessly and then save them in database server. The hardware part consists of a main unit represented by ARDUINO Uno and sensors of soil moisture and DHT11. The wireless communication link between the hardware and control center parts are covered using Bluetooth HC-06. In the control center, the database is built using SQL server 2015 and the related Graphical User Interface (GUI) frames is designed using Visual Studio C#. The proposed system has been presented in a prototype to represent the case study and the obtained results show a clear reduction of power and water consumption.


Article
Depth Estimation and Shape Reconstruction of a 2D Image Using N.N. and Bézier Surface Interpolation

Authors: Luma Issa Abdul–Kreem
Pages: 24-32
Loading...
Loading...
Abstract

Inferring 3D image from 2D image is an advance topic in computer vision. This article considers a 2D image depth estimation of an object and reconstructs it into a 3D object image. The 2D image is defined by slices, where each slice contains a set of points that are located along the object contour and within the object body. The depths of these slices are estimated using the neural network technique (N.N.), where five factors (slice length, angle of the incident light and illumination of some of points that located along the 2D object, namely control points) are used as inputs to the network. The estimated depths of the slices are mapped into a 3D surface using the interpolation technique of the Bezier Spline surface. Our model was tested and evaluated using different objects with different and complex shapes. The results showed an effective performance of the proposed approach.


Article
Proposed Pseudo Random Generator Based on RC5 Block Cipher

Authors: Ashwaq Talib Hashim --- Zaid Mundher Radeef
Pages: 33-41
Loading...
Loading...
Abstract

Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic primitives. This paper presents a 64-bit random number generator with a high generation speed and a good random sequences by employing the RC5 encryption algorithm round functions with some changes in the usage of the key, where two keys have been used with an initial vector to start the sequence generator. This generator can be used as a keys generator for any security system or to generate an intermediate password for signing process, and it can be adapted in many other applications, such as random pattern generation, games, etc. Examining the sequences shows great results in terms of randomness and security by achieving a difference near 0.5, this value is the best result, and a high undependability on the previous generated sequences by also achieving a difference more than 0.5, frequency, serial and run test came out with a near optimality results.


Article
Convolutional Code Constraint Length over Rayleigh Fading Channel: Performance Evaluation and Hardware Aspects

Authors: A. E. Abdelkareem
Pages: 42-48
Loading...
Loading...
Abstract

In this paper, the performance of convolutional code constraint length for bandwidth efficient transmission over AWGN and Rayleigh fading channels is presented. Using intensive simulation and in terms of BER error floor, we evaluate the performance of binary phase shift keying (BPSK) mapping scheme. In addition, the hardware implementation considerations based on the Digital Signal Processor (DSP) platform of convolutional decoding are discussed. To be more specific, the code constraint length effect on both memory management and clock cycles are considered.


Article
Echo Cancellation in Telecommunications Using Variable Step-Size, Dynamic Selection, Affine Projection Algorithm.

Authors: Sara M. Motar --- Ali O. Abid Noor
Pages: 49-58
Loading...
Loading...
Abstract

This paper focuses on how to improve the performance of Acoustic Echo Cancellation AEC in voice communication systems. A variable step-size, dynamic affine projection algorithm named as DSVSSAPA is devised for this purpose. The proposed version combines the merits of the variable step size APA as well as uses dynamic selection of the input vectors to reduce its computational power, which has not been found in literature elsewhere. The version proposed in this paper overcomes drawbacks incorporated with the standard AP algorithm. These drawbacks are convergence speed-misalignment trade off problem and the high computational complexity of the algorithm. The proposed algorithm reduces the computational complexity by carrying the update after satisfying a specific criterion. Performance of the proposed echo canceller is evaluated and compared with those obtained from the same echo canceller but based on conventional algorithms such as the normalized least mean square algorithm NLMS and the original affine projection algorithm APA. The performance is measured in terms of misalignment and echo return loss enhancement ERLE. Simulation results showed superior ERL performance of the DSVSSAPA compared to other algorithms. It also achieves 17.73% reduction in computational complexity compared with conventional APA which is useful in portable communication applications.

Keywords


Article
Design a Hybrid Cryptosystem Based Chaos and Sharing for Digital Audio

Authors: Mahmood Z. Abdullah --- Zinah J. Khaleefah
Pages: 59-70
Loading...
Loading...
Abstract

With the growth rate of wireless communication with internet and multimedia. The wireless network has expanded their applications in our life. Cryptography and steganography play important role within data security. This paper chiefly produces a novel hybrid cryptography and steganography for digital audio base chaos system and secret sharing scheme algorithm. These algorithms have multilevel of processing with the digital audio to increase the level of security. In this algorithm, digital audio was encrypted with a novel encryption method based Lorenz chaos map. Then, divide the encrypted audio to N encrypted audio based on secret sharing scheme. Finally, hiding N encrypted audio in N cover images with chaos system process. The result shows that the algorithm for audio encryption have a high degree of confidence, large key space reached more than 2672 possible of a key, key sensitivity, and high quality of recovered digital audio. Chaos system and secret sharing process with multi-cover images offers additional space, security for the secret audio message, and quality for cover images. The power signal to noise ratio of cover images reached to 57db with embedding 334 KB of secret audio with four cover images.


Article
Design of a Continuous Sliding Mode Controller for Path Tracking of an Articulated Vehicle

Authors: Thaker Mahmood Nayl
Pages: 71-82
Loading...
Loading...
Abstract

This article presents design and evaluation of a sliding mode control scheme, being applied to the case of an articulated vehicle. The proposed Sliding Mode Controller (SMC) is based on a continuous sliding surface, being introduced for reducing the chattering phenomenon, while achieving a better tracking performance and a fast minimization of the corresponding tracking error. The derivation of the sliding mode controller relies on the fully nonlinear kinematic model of the articulated vehicle, while the overall stability of the control scheme is proven based on the Lyapunovs stability condition. The performance of the established control scheme is evaluated through circle path tracking scenario on a small-scale articulated vehicle

Table of content: volume:17 issue:1