EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY

Sufyan T. Faraj

Volume 2, Issue 1 , April 2008, Page 1-11

https://doi.org/10.37652/juaps.2008.15412

Abstract
  SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform ...  Read More ...
INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS
INVESTIGATION OF JAVA SMART CARD TECHNOLOGYFOR MULTI-TASK APPLICATIONS

Sinan G. Abid Ali; Nidhal E. Berbat; Sufyan T. Faraj

Volume 2, Issue 1 , April 2008, Page 12-23

https://doi.org/10.37652/juaps.2008.15423

Abstract
  The objective of this work is to build a number of different secure applets for Java smart card were each applet is designed for a specific task. Three packages were designed; the first ...  Read More ...
IMAGE WAVELETE COMPRESSION USING SHIFT CODING AND BITMAP SLICING
IMAGE WAVELETE COMPRESSION USING SHIFT CODING AND BITMAP SLICING

Samyia S. Lazar; Azmi T. Huseen; Loaye A. Goerge

Volume 2, Issue 1 , April 2008, Page 24-42

https://doi.org/10.37652/juaps.2008.15464

Abstract
  ABSTRACT:The technique of image compression means reduce the size of image data in a way that can be reconstructed to its necessary components. This technique convert image data to ...  Read More ...
REMOVING IMAGE NOISE BASED ON FUZZY LOGIC CONCEPT
REMOVING IMAGE NOISE BASED ON FUZZY LOGIC CONCEPT

Warqaa Y.Ibraheem; Sahar Kh. Ahmed; Nada N. Saleem

Volume 2, Issue 1 , April 2008, Page 43-55

https://doi.org/10.37652/juaps.2008.15430

Abstract
  In the present research algorithms employing fuzzy logic on median and mean filters for improving impulse noise removal performance for image processing have been developed. These algorithms ...  Read More ...
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT

Ali M. Sagheer; Abdulrahman D. Khalaf

Volume 2, Issue 1 , April 2008, Page 56-65

https://doi.org/10.37652/juaps.2008.15479

Abstract
  This paper introduces a system, which can be applied for monitoring of the speed of moving objects using a single camera. The Monitoring System is developed to monitor one moving object ...  Read More ...
Scintillation on non Standard Atmosphere
Scintillation on non Standard Atmosphere

Ahmed N. Rasheed

Volume 2, Issue 1 , April 2008, Page 66-72

https://doi.org/10.37652/juaps.2008.15506

Abstract
  There are several methods to measure the magnitude of scintillation. Most of which their equations do not include meteorological element .In meantime we can not measure the magnitude ...  Read More ...
CODING OF VIDEO OVER IP-BASED NETWORKS
CODING OF VIDEO OVER IP-BASED NETWORKS

Samara A. Elia; Nasser N. Khamiss Alani

Volume 2, Issue 1 , April 2008, Page 73-82

https://doi.org/10.37652/juaps.2008.15425

Abstract
  :This paper is developed to study the compression performance of video by using searching method of motion estimation OTS and SNR scalable coding to enhance the quality of video sample. ...  Read More ...
EFFICIENT WIRELESS VIDEO TRANSMISSION VIA LINKLAYER FEC FOR VIDEO COMMUNICATIONS
EFFICIENT WIRELESS VIDEO TRANSMISSION VIA LINKLAYER FEC FOR VIDEO COMMUNICATIONS

Ghaida A. AL-Suhail

Volume 2, Issue 1 , April 2008, Page 83-93

https://doi.org/10.37652/juaps.2008.15451

Abstract
  In this paper, new analysis and performance of robust error-model are presented for MPEG-4 video stream over wireless point-to-point network. Analytical expressions assume a noisy wireless ...  Read More ...
ADAPTIVE LEARNING RATE VERSUS RESILIENT BACKPROPAGATION FOR NUMERAL RECOGNITION
ADAPTIVE LEARNING RATE VERSUS RESILIENT BACKPROPAGATION FOR NUMERAL RECOGNITION

Muntaser Abdul-Wahed Salman

Volume 2, Issue 1 , April 2008, Page 94-105

https://doi.org/10.37652/juaps.2008.15445

Abstract
  Two types of neural networks learning algorithms were created, trained, tested, and evaluated in an effort to find the appropriate neural network training method for use in numeral ...  Read More ...
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME

Ali M. Sagheer

Volume 2, Issue 1 , April 2008, Page 106-115

https://doi.org/10.37652/juaps.2008.15446

Abstract
  In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. ...  Read More ...
IRIS SEGMENTATION USING GA BASED CIRCULAR HOUGH TRANSFORM (GACHT
IRIS SEGMENTATION USING GA BASED CIRCULAR HOUGH TRANSFORM (GACHT

Rabah N. Farhan

Volume 2, Issue 1 , April 2008, Page 116-123

https://doi.org/10.37652/juaps.2008.15519

Abstract
  Iris recognition system consists of a sequence of stages, each stage perform specific functions on the captured image of the human iris. The first stage is automatic segmentation of ...  Read More ...
IWCD-PROPOSED IMAGE COMPRESSION METHOD BASED ON INTEGER WAVELET AND DCT
IWCD-PROPOSED IMAGE COMPRESSION METHOD BASED ON INTEGER WAVELET AND DCT

Abdullah.M.Awad Al-Fahdawi

Volume 2, Issue 1 , April 2008, Page 124-130

https://doi.org/10.37652/juaps.2008.15443

Abstract
  This paper describes a new lossy image compression decompression algorithm. In lossy compression techniques there are some loss of information, and image cannot be reconstructed exactly.This ...  Read More ...
PERFORMANCE STUDY OF OFDM BASED ON IP-WT
PERFORMANCE STUDY OF OFDM BASED ON IP-WT

Salih M. Salih

Volume 2, Issue 1 , April 2008, Page 131-138

https://doi.org/10.37652/juaps.2008.15411

Abstract
  In this paper, a proposed model based on In-Place Wavelet Transform (IP-WT) was suggested to improve the performance of the Orthogonal Frequency Division Multiplexing (OFDM) under the ...  Read More ...
PROBABILISTIC QUANTUM COMPUTER SIMULATOR
PROBABILISTIC QUANTUM COMPUTER SIMULATOR

Yusra Mahmood Humadi

Volume 2, Issue 1 , April 2008, Page 139-144

https://doi.org/10.37652/juaps.2008.15527

Abstract
  Quantum Computation is a new field in science. It relates to quantum physics and computer science. The concept of quantum computers regarded new theoretical stage due to the fact that ...  Read More ...
DESIGN OF NEWMODEL FOR SLR-PARSER
DESIGN OF NEWMODEL FOR SLR-PARSER

Essam T. Yassen

Volume 2, Issue 1 , April 2008, Page 145-158

https://doi.org/10.37652/juaps.2008.15432

Abstract
  : In last decades the applications of the computerized system were widely used in various environments, such real time systems, monitoring system and other. These applications need ...  Read More ...
IMPLEMENTATION OF MULTIRATE TECHNIQUE IN WIRLESS APPLICATION USING FPGA
IMPLEMENTATION OF MULTIRATE TECHNIQUE IN WIRLESS APPLICATION USING FPGA

Ali M.Al-Bermani

Volume 2, Issue 1 , April 2008, Page 159-168

https://doi.org/10.37652/juaps.2008.15476

Abstract
  :Multirate filter is one of the main parts that determining the receiveing quality in wireless communication. Wireless applications including ETSI DVB-T/H digital terrestrial television ...  Read More ...
BITMAP INDEX: A DATA STRUCTURE FOR FAST FILE RETRIEVAL
BITMAP INDEX: A DATA STRUCTURE FOR FAST FILE RETRIEVAL

Murtadha M. Hamad

Volume 2, Issue 1 , April 2008, Page 169-178

https://doi.org/10.37652/juaps.2008.15456

Abstract
  Bitmap structure indexes are usually used in database environments which have large amount of data. Bitmap reduces response time and storage requirements for large database compared ...  Read More ...
EFFICIENCY OF SOME CLASSIFICATION METHODS ADOPTED IN CLINICAL REMINDER SYSTEMS IN CASES OF MIXED DATA
EFFICIENCY OF SOME CLASSIFICATION METHODS ADOPTED IN CLINICAL REMINDER SYSTEMS IN CASES OF MIXED DATA

Imad H.A. AL-Iathary; Murtadhah M.H

Volume 2, Issue 1 , April 2008, Page 179-185

https://doi.org/10.37652/juaps.2008.15442

Abstract
  Cluster analysis techniques are widely used in medical researches. Clustering techniques are not unique and hence users must be extremely conscious about what to use in order to analyze ...  Read More ...
A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING
A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING

Rana F. Ghani; Ahmed T. Sadik

Volume 2, Issue 1 , April 2008, Page 186-194

https://doi.org/10.37652/juaps.2008.15462

Abstract
  The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm ...  Read More ...