Performance Testing Technique for Applied Programs
Performance Testing Technique for Applied Programs

Falath M. Mohammad; Mortadha M. Hamad

Volume 6, Issue 2 , August 2012, Page 1-5

https://doi.org/10.37652/juaps.2012.63156

Abstract
  In this paper, software was preparedto use for measuring the programs performance because of the importance of measuring the programs performance. The performance of any program basically ...  Read More ...
Face Detection by Skin Color based on Elman Neural Network
Face Detection by Skin Color based on Elman Neural Network

Ghada Thanoon; Nadia maan; Amera Istiqlal

Volume 6, Issue 2 , August 2012, Page 1-5

https://doi.org/10.37652/juaps.2012.63370

Abstract
  In this paper, a propose system was present for face detection by the color of skin which is the main feature in the skin, the system depends on the color properties that extracted ...  Read More ...
Optimal Code book Generating LBG Algorithm
Optimal Code book Generating LBG Algorithm

Ibrahim Ahmed saleh; Khalil Ibrahim Al

Volume 6, Issue 2 , August 2012, Page 6-12

https://doi.org/10.37652/juaps.2012.63371

Abstract
  In this research, have been applied(LBG) algorithm to create optimal code book tat used in vector quantization, which use in widely for image and signal processing .It use in image ...  Read More ...
Trusted Cloud Computing
Trusted Cloud Computing

Kashif Kifayat; Waleed K. Awad; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, Page 6-13

https://doi.org/10.37652/juaps.2012.63157

Abstract
  Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ...  Read More ...
A New VQ Technique for Steganography in JPG
A New VQ Technique for Steganography in JPG

Ansam Osama Abdulmajeed; Ahmed Sami Nori

Volume 6, Issue 2 , August 2012, Page 13-19

https://doi.org/10.37652/juaps.2012.63372

Abstract
  present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure ...  Read More ...
The Mechanism of Deliberate Jamming On the Broadcast Satellite Service.
The Mechanism of Deliberate Jamming On the Broadcast Satellite Service.

Riyad Mitieb Mahmood

Volume 6, Issue 2 , August 2012, Page 14-21

https://doi.org/10.37652/juaps.2012.63233

Abstract
  A direct broadcast satellite is making maximum efforts to transmission the TV signal from the source to the receiving in the small home earth stations, especially the important events ...  Read More ...
Standard printed musical note recognition based on neural network
Standard printed musical note recognition based on neural network

Saja jasem Mohammed

Volume 6, Issue 2 , August 2012, Page 20-25

https://doi.org/10.37652/juaps.2012.63373

Abstract
  Artificial neural network is widely used for many computer applications and assure it success in all of these fields, like recognition applications. In this paper the a supervised NN ...  Read More ...
Management of Identity and Access in the Cloud
Management of Identity and Access in the Cloud

Kashif Kifayat; Sameeh Abdulghafour Jassim; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, Page 22-33

https://doi.org/10.37652/juaps.2012.63234

Abstract
  Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ...  Read More ...
An Enhanced Authentication Based on Biometric and Neural Network
An Enhanced Authentication Based on Biometric and Neural Network

Nadia maan; Melad Jader; Najla Badie

Volume 6, Issue 2 , August 2012, Page 26-32

https://doi.org/10.37652/juaps.2012.63374

Abstract
  Because of the significant in the field of information technology, increasing means of communication and networks , proliferation of electronic crimes and personality theft, the security ...  Read More ...
Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm
Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm

Raya Jassim Essa

Volume 6, Issue 2 , August 2012, Page 33-39

https://doi.org/10.37652/juaps.2012.63375

Abstract
  The paper aims at verifying the reliability of the exchanged data and information. The study conducted using the Pretty Good Privacy (PGP) algorithm application within a network of ...  Read More ...
A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements
A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements

Suhail M. Ali

Volume 6, Issue 2 , August 2012, Page 34-40

https://doi.org/10.37652/juaps.2012.63235

Abstract
  is obvious that Artificial Neural Networks (ANN) is a successful method for system control and simulating nonlinear loads. This paper suggests an ANN model that can simulate the effects ...  Read More ...
Implementation of a Proposal Encryption Algorithm for Voice over Internet Protocol (VoIP)
Implementation of a Proposal Encryption Algorithm for Voice over Internet Protocol (VoIP)

Manar Y. Kashmola; Ahmed Yassin Kamil

Volume 6, Issue 2 , August 2012, Page 40-47

https://doi.org/10.37652/juaps.2012.63376

Abstract
  The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, ...  Read More ...
The New Intelligent System for the Protection of E-learning from Penetration
The New Intelligent System for the Protection of E-learning from Penetration

Waleed khaled; Salah M. Arawi; Khattab M. Ali Alheeti

Volume 6, Issue 2 , August 2012, Page 41-44

https://doi.org/10.37652/juaps.2012.63236

Abstract
  This paper focuses on the design new intelligent system to prevent the e-learning from attack. electronic learning (e-learning) systems are becoming widely used tools for distance education/training ...  Read More ...
Design of Embedded Image Processing System Using FPGAs
Design of Embedded Image Processing System Using FPGAs

Sara A. Mohamed; Mazen R. Khalil

Volume 6, Issue 2 , August 2012, Page 45-49

https://doi.org/10.37652/juaps.2012.63237

Abstract
  The work aims to design an image processing system to be configured on Spartan-3E FPGA. Embedded design techniques were adopted to construct a soft core processor system. Intel strata ...  Read More ...
Copyright Authentication By Using Karhunen-Loeve Transform
Copyright Authentication By Using Karhunen-Loeve Transform

Ghada Thanon Yuonis; Sundus Khaleel Ebraheem; Khalil I. Al

Volume 6, Issue 2 , August 2012, Page 50-57

https://doi.org/10.37652/juaps.2012.63238

Abstract
  Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper ...  Read More ...
Key Management Scheme for Mobile Wireless Sensor Networks
Key Management Scheme for Mobile Wireless Sensor Networks

Sufyan T. Faraj; Foad Salem Mubarek

Volume 6, Issue 2 , August 2012, Page 58-64

https://doi.org/10.37652/juaps.2012.63239

Abstract
  Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ...  Read More ...
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS

Shaymaa W. Abdulatteef

Volume 6, Issue 2 , August 2012, Page 65-69

https://doi.org/10.37652/juaps.2012.63240

Abstract
  This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark ...  Read More ...
TORDES-THE NEW SYMMETRIC KEY ALGORITHM
TORDES-THE NEW SYMMETRIC KEY ALGORITHM

Pawitar Dulari; Ajay Bhushan

Volume 6, Issue 2 , August 2012, Page 70-74

https://doi.org/10.37652/juaps.2012.63241

Abstract
  The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies ...  Read More ...
Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures
Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures

Azmi shawkat abdulbaki

Volume 6, Issue 2 , August 2012, Page 75-78

https://doi.org/10.37652/juaps.2012.63242

Abstract
  Sign language Plays important role in activating the relation between people and computers , through the activation of the concept of hand movements and provide easier way for people ...  Read More ...
New Construction of a Chaotic Generator on the Lorenz Attractor
New Construction of a Chaotic Generator on the Lorenz Attractor

Abdallah M; Mohamed Sadek Ali-Pacha; Naima Hadj-Said; Adda Ali-Pacha

Volume 6, Issue 2 , August 2012, Page 79-84

https://doi.org/10.37652/juaps.2012.63243

Abstract
  it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although ...  Read More ...
Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time
Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time

Ali Jbaeer Dawood

Volume 6, Issue 2 , August 2012, Page 85-89

https://doi.org/10.37652/juaps.2012.63364

Abstract
  Round Robin (RR) is a kind of process algorithms, where the time quantum is fixed along the processes execution. In the other hand it depending on the First Come First Serve (FCFS) ...  Read More ...
The Mechanism of Monitoring and Tracking of Healthcare Systems
The Mechanism of Monitoring and Tracking of Healthcare Systems

Khattab M. Ali Alheeti; Raed I. Hamed; Muzhir Shaban Al-Ani

Volume 6, Issue 2 , August 2012, Page 90-94

https://doi.org/10.37652/juaps.2012.63365

Abstract
  This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people ...  Read More ...
The Role of Metadata for Effective Data Warehouse
The Role of Metadata for Effective Data Warehouse

Alaa Abdulqahar Jihad; Murtadha M. Hamad

Volume 6, Issue 2 , August 2012, Page 95-100

https://doi.org/10.37652/juaps.2012.63366

Abstract
  Metadata efficient method for managing Data Warehouse (DW). It is also an effective tool in reducing the time or speed to answer queries. In addition, it achieved capabilities of the ...  Read More ...
The Use of Two Transform Methods in Fingerprints Recognition
The Use of Two Transform Methods in Fingerprints Recognition

Baraa Tareq Hammad; Khattab M. Ali; Salah Sleibi Al-Rawi; Ismail Taha Ahmed

Volume 6, Issue 2 , August 2012, Page 101-108

https://doi.org/10.37652/juaps.2012.63367

Abstract
  Finger prints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness ...  Read More ...
Data Hiding In Contourlet Coefficients Based On Their Energy
Data Hiding In Contourlet Coefficients Based On Their Energy

Khalil I. Alsaif; Nagham S. AL-lella

Volume 6, Issue 2 , August 2012, Page 109-123

https://doi.org/10.37652/juaps.2012.63368

Abstract
  The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research ...  Read More ...
Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures
Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures

Abdulhamed M. Jasim; Jassim M. Abdul-Jabbar

Volume 6, Issue 2 , August 2012, Page 124-134

https://doi.org/10.37652/juaps.2012.63369

Abstract
  In this paper, the 1st order Gaussian derivative wavelet function utilized in the design of some corresponding filter banks. Since the 1st order Gaussian derivative function has a similar ...  Read More ...