Professional Documents
Culture Documents
on Information Technology
( ICoIT'17 )
lfu.edu.krd/conferences/icoit17
This Page Intentionally Left Blank
Preface
This specific IT conference is the first of its kind that will be held in our
university and Erbil as well. The goal of this conference is to promote the
development of cutting edge research, invent development in IT and to develop
links between researchers, academicians and experts in Kurdistan and other
universities whether in Middle East or Western universities.
Since the conference committee has put strict controls to meet quality
measurements and rejected a number of submitted research papers who have
exceeded the similarity index percentage and considering the reviewers
professional feedback, the number of accepted research papers were brought
down to 49.
i
We are looking forward to hear what the technology gurus, researchers will
share the technology advancement and their impact on our society and daily
lives.
Finally, the organizing committee would like to express their gratitude to the
Conference Scientific Committee and International Program Committee.
Without their contributions, this conference would not have been possible.
ii
ICoIT17
ORGANIZING COMMITTEE
Conference Chair : Asst. Prof. Dr. Mazin S. Al-Hakeem
Head of IT Department - LFU
iii
ICoIT17
SCIENTIFIC COMMITTEE
Prof. Dr. Alaa Hussein Al-hamami Prof. Dr. Tarik A. Rashid
Princess Sumaya University for Technology University of Kurdistan Hewler
Jordan Kurdistan Region Iraq
Prof. Dr. Ali Makki Saghaer Prof. Dr. Aree Ali Mohammed
University of Anbar University of Sulaimani
Iraq Kurdistan Region Iraq
Asst. Prof. Dr. Loay E. George Asst. Prof. Dr. Kamran Faraj
University of Baghdad Cihan University Sulaimani
Iraq Kurdistan Region Iraq
Asst. Prof. Dr. Mary Agoyi Asst. Prof. Dr. Zarei Behrouz
Cyprus International University University of Tehran
Republic of Northern Cyprus Iran
iv
ICoIT17
INTERNATIONAL TPC
(TECHNICAL PROGRAMME COMMITTEE REVIEWERS)
v
Nidhal El Abbadi, PhD University of Kufa Iraq
Osama Abbas Hussein, PhD Middle Technical University Iraq
Reem Jafar, PhD Cihan University Erbil Kurdistan Region - Iraq
Salah Yahya, Prof., PhD University of Koya Kurdistan Region - Iraq
Saman M. Abdullah University of Koya Kurdistan Region - Iraq
Sarina Muhamad Noor, PhD Universiti Utara Malaysia Malaysia
Suha Hadi, PhD University of Baghdad Iraq
International University of
Susan Al Naqshbandi, PhD Kurdistan Region - Iraq
Erbil
Soukaena Hassan, PhD University of Technology Iraq
Taleb A. S. Obaid, Prof., PhD University of Basrah Iraq
University of Kurdistan
Tara Botani, PhD Kurdistan Region - Iraq
Hewler
University of Kurdistan
Tarik A. Rashid, Prof., PhD Kurdistan Region - Iraq
Hewler
Wesam S Bhaya, Prof., PhD University of Babil Iraq
Zarei Behrouz, PhD University of Tehran Iran
vi
ICoIT17
KEYNOTE SPEAKERS
Prof. Dr. Alaa Hussein Al-hamami Prof. Dr. Ali M. Sagher
Princess Sumaya University for Technology University of Anbar
Jordan Iraq
Asst. Prof. Dr. Faiz Al-Alawy Asst. Prof. Dr. Ali Ahme
Kent State University University of Basrah
USA Iraq
Asst. Prof. Dr. Dujan Basheer Taha Asst. Prof. Dr. Emad H. Al-Hemiary
Mosul University Al-Nahrain University
Iraq Iraq
vii
This Page Intentionally Left Blank
viii
TABLE OF CONTENTS
5G: MIMO BDMA SYSTEM TRENDS AND TECHNOLOGY
Ashwaq Q. Hameed, Salman Goli and Zahraa Jaafar Oleiwi . 1
A Developed Realistic Urban Road Traffic in Erbil City Using Bi-directionally Coupled
Simulations
Prof. Dr. Saad Talib Hasoon and Muhammed A. Mahdi ... 28
Adaptive Data Collection protocol for Extending Lifetime of Periodic Sensor Networks
Ali K. M. Al-Qurabat and Ali Kadhum Idrees ... 108
An Analytical Study for Some Drawbacks and Weakness Points of the AES Cipher
(Rijndael Algorithm)
Omar A. Dawood and Othman I. Hammadi ... 129
ix
An Overview of Software Defined Environment
Ali Dheyaa Jalil and Dr. Abdulkareem A. Kadhim 134
Building New Tool for Software Project Planning Based on Meta-modeling Concepts and
CMMI Meta-Standards
Husam Bofaoor ... 143
Computer Aided Diagnosis System for Breast Cancer using ID3 and SVM Based on
Slantlet Transform
Mohammed Salih Mahdi .... 157
Design a Complete Website for the Sustainable Development Goals (SDG) in Iraq
Amer S. Elameer, Methaq Khamis and Amjed Abbas ... 165
x
Evolving Fuzzy Neural Network Equalization of Channel Impulse Response in Optical
Mode Division Multiplexing
Anahed M. Kareem and Assoc. Prof. Dr. Angela Amphawan ... 295
Fast and Accurate Real Time Pedestrian Detection Using Convolutional Neural Network
Hayder Albehadili, Laith Alzubaidi, Jabbar Rashed, Murtadha Al-Imam and Haider A.
Alwzwazy ... 305
Finding Shortest Path Basing on Dijkstra's Algorithm For Baghdad Universities by using
Geographic Information System Applications
Roaa Ebada Saeed, Amer Saleem Elameer and Rafah Shahab Alhamdani ... 317
xi
SMS DISTRIBUTER BASED PATIENT APPOINTMENTS SYSTEM
Mohammad Salim Abdulrahman, Rebin B. Koshnaw and Dr. Mazin S. Al-Hakeem ... 442
, E. Banking
........................................................ . .
( )
...........................................................................................................
xii
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION.
T he various multiple access techniques is growing at a rapid pace for multiple user to
usage efficient like is Time Division Multiple Access (TDMA), Frequency Division
Multiple Access (FDMA)... Etc. In Telecommunication system, the limitation oftime
1
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
and frequency are divided to be used by subscribers (user) also capacity is limited because
depend on giving frequency and time. Now we demand a development technique utilize other
resources to increase the ability of system. So the thought of Koreans in seeking for finding
anew access technique Known as BDMA for next generation (fifth generation) of mobile
wireless communication system. Short term of BDMA is Beam Division Multiple
Access.Next generation utilize (BDMA) that enable to transmit data rate greater than
100Mbps for one square kilometer to million Internetof things. 5G includes advantages such
it is the strongest and high demanding in the near future. Founding 5G technology have
come to existence high resolution for moving mobile users, higher data rates and Quality of
Service (QoS), high bandwidth. Big challenge in the telecommunication field will be to
how increase capacity of system and quality of service within the limited frequency
spectrum, in 5g will be frequency band 3-300GHz and the Bandwidth of 1 Giga bit per
second (Gbps) or highest from that[1]. Mobile wireless communication system based on
BDMA has to support better quality service to a lots of subscribers. Fifth generation (5G)
telecommunications network provided typical solutions for thecommon problems in the
fourth generation (4G). Add to that we can increase the capacity and reliability, in this
technology also we can reduce bit error rate [2].
2. Beam Division Multiple Access and Fifth Generation.
The main aim of (mobile network wireless communication system) has to availability high
quality of service to a big number of user via different beams by select user without
interference of beams with others and affordable cost. Beam Division Multiple Access
(BDMA) is foreseen as the latest multiple access technology for next or fifth generation (5G)
of wireless communication [3]. What meant by the beam division? It is dividing of beam
according to environment will towards to desired direction and nulls are placed in undesired
direction. In BDMA available beam can be divided in to 3D and improve the capacity of
system as shown in figure 1. Multiple accesses to channel depend on multiple access
technology. A channel represents a resources of data that enable the user (mobile station) to
connect with other user in network. Many user can be share a large data from their resources
by using a finite spectrum in multiple access. Multiple access is desirable to allow the
subscriber to send information at the same time from mobile station (MS) to base station
(BS) while receiving information from BS, in wireless communication system.
2
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
From (1G) to the(2.5G) and from (3G) to (5G) Communications system improved
dramatically with a significant improvement in the transfer and receipt of data. Because of
the huge volume of data and sources and increasing numbers of subscribers, it has become
necessary to develop communication system and meet the real requirements of users. 5G (5th
generation mobile networks or 5th generation wireless systems) Designed for the future of
mobile telecommunications standards, and it is supposed to outperform significantly on the
current 4G standards. Due to the frequency band of 5G will be 3-300GHz and the bandwidth
more than 1Gbps, so that will become more capacity and quality of service than previous
generations[5]. 5G provides many features such as photo gallery, messenger, and multimedia
applications, telephony, camera, etc.Add to high speed and capacity, and low in cost (per
bit). All this features supports, video streaming, interactive Internet, and other broadband
services. This technology has a great future because it can handle best technologies such as
BDMA. World market willacquires by the 5G technology [5].
The major differences, between present generations and expected 5G techniques as shown
in figure 2 are:
a. High data rates up to 1Gbps.
b. A large range of signal coverage.
c. Reduce the battery consumption.
d. Different and multiple paths for data transmission at the same time.
e. Worldwide wireless web (wwww).
f. More security.
g. Supposed to have no effect on human health.
3
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
4
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Disadvantages of 5G mm wave:
Millimeter wave goes through different losses such as penetration, rain attenuation etc.
Moreover path loss at mm is proportional to square of the frequency.
Loss in mm wave frequencies due to Foliage.
Supports only LOS (Line of Sight) propagation. Hence coverage is limited to LOS.
Loss of energy because of higher at millimeter wave due to more number of radio
frequency modules due to large number of antennas [7].
Mobile Ad Hoc Network (MANET) It is a connecting multiple nodes or terminals with some
in a way wireless communications without the service of any controlling or microcontroller.
These nodes can be able to communicate and transfer information away from the use of any
existing fixed network infrastructure [8]. Mobile computing in the field of computers and
communications it has become a high-level Due to the rapid development of Computing.
(MANET) it is a completely wireless connection, and it's done by nodes at each calculator
or Mobile, and usually take the Dynamic form with a limited bandwidth. The most prominent
challenges in Mobile ad hoc networks is the process of guiding thedata packets from end to
end (source to destination), Where it will be difficult in mobile ad hoc networks because of
the continued movement and the absence of centralized control over all nodes (Mobile
Station) [9] as shown in figure 5. Types of MANET as shown in figure 4:
1. VANETs. Communication between vehicles, also between vehicles and equipment on the
Roadsides can be use VANETs.
2. Mobile nodes and stable Internet-nodes can be linked by Internet Based Mobile Ad-hoc
Networks (I MANET)[10].
5
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The main goal of mobile communication systems is to provide good services to a larger
number of mobile users at lower costs. To provide good services, three are major multiple
access techniques FDMA, TDMA and CDMA used to share the available bandwidth in a
6
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. Frequency Division Multiple Access (FDMA) Each user have a dedicated allocation of
one or several frequency bands in this technique.
2. Time Division Multiple Access (TDMA) - Number of users can share the same frequency
channel by partition the signal into slots of time in this technique.
3. The codes that provides the mobile stations can be separates calls by using code Division
Multiple Access (CDMA) technique.
4. Enhance resource of system frequency can be done through division and allocation by
using Orthogonal Frequency Division Multiple Access (OFDMA).
In future, due to the increasing in number of user (MS) and the volume of data to be
transferred, the capacity of (wireless network communication system) required to increase
[11].
Due to the increasing subscribers' request to need a new technology which can meet their
needs, such that it should improve the channel efficiency, data rate and provide quality in
service. MIMO is one technology to develop solutions for this situation, it is able to provide
the required performance using multiple transmitter and receiver antennas [10]. BDMA is
7
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
the last technique in which an orthogonal beam is allocated to each mobile station. this
orthogonal beam is allocated to every mobile station (MS) need to communication with base
station (BS), The BDMA technique depend on time division multiple access with slow
frequency hopping (SFH-TDMA) and orthogonal frequency division multiplex
(OFDM)[10]. division of beam can be done through BS based on locations and number of
MS, thereby significantly increases the capacity of the system since BS can be transmit single
or multiple beam at the same time and without interference to provide multiple access of
system [11]. When MS and a BS can be in Line of Sight an (LOS) state BS will transmit
single beam, But When MS are positioned at different angles compared to the BS, and the
BS will transmit beams at different angles to transmit data at the same time. BDMA uses
phased antenna array, beam forming technique to produce dedicated beam and uses multiple
beam for multiple access, in a new space division multiple access technique. When mobile
stations are present at different positions or angles, each one of them are provided with a
beam separately. If the mobile stations are in same location then they use a single beam, by
using the available frequency - time for multiple accessesas shown in figure 7. The change
in position, speed or direction of mobile station means change the number of beams, width
and direction according to movements of mobile station [12].
A. In the beginning, the positions of BS and MS unknown to both; the mobile stations must
be discovering its location and moving speeds and the location of base station.
B. The mobile station transmit there moving speed and position to base station, and then BS
determines the width and direction of downlink beam (DL).
8
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
C. Once, the direction and width of the DL is computed by mobile station, and transmits the
uplink beam (UL) in the same direction.
D. Base station receiving the UL, after that the (uplink and downlink beam) should be
updating to start of carrying data [12].
Beam forming is a method used to configure the radiation from the antennas to the desired
shape and the desired direction (mobile phone) Directed radiation empty for non-desirable
trend. It used for direct data transfer and receipt of the signal between the base station and
mobile station. There are basically two approaches:
1. Switched beam antenna: Generate a limited number of radiation patterns, which makes the
RF signal and one is available each beam is possible. It has been compiled using the patterns
of wireless network the simplest approach beam Switched compared with adaptive approach.
This it provides a significant increase in Network capacity compared with the Conventional
multi-directional antenna Systems or existing systems sector.
2. Adaptive Array Antenna: an infinite number of radiation patterns of use of adaptive air
Matrix is one of the areas that promise further improve Wireless systems and provide
improved capability Safety by the capabilities of the site's position.
This is Matrices can be used to reject any interference as shown in figure 9by:
9
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Where d means downlink, , is the physical distance between transmit and receive of
antenna along path p, and is the r carrier wavelength. Added to that, () CN1 which
obtain ||()||2= 1is the subscribeof the (antenna array)., and et() CM1 which obtain
et()_2 = 1 is the base station (BS) of the antenna array. The channel frequency is the
equation below:
[, ] =1
=1
,
exp (2 (,) /)* (, ) ( , ) exp(2 (,) )(2)
Where (,) is the (Spread delay)linked with the (pth path). We suppose that the uplink
physical channel has the same parameters ( , , , , (,) ) as the downlink channel except
for the carrier frequency and the initial phases Hence,uplink channel can be calculate[14] .
10
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
If we assume that users are quite far away from the BS such that the phases 2d ^ (p,u)/r
are uniformly distributed on [0, 2] and due to the uncorrelated scattering, it become
mutually independent. Now, we have:
This assumption depend on the BS antennas are located much higher rooftops this means a
lack of distractions in BS. Where ^(p,u) = E {|o^(p,u)|2} is the channel gain of path p [15].
( (, ) (, )) = (N-N ')(6)
, = 1 2 , ,
=1 1=1[ ]N,b1 ( ) ( 1 ) = Wu,
(7)
[,
]N, b1 (,)(,1)
,
exp(2(,) /) exp(2 (,) )(8)
Where (,)is the receiving angles for set of all paths, and (,1) is the transmit angle for
set of paths.
So,number of columns in channel matrix , is [15]:
2 (,)
Vec(, )= 1
=1 1=1 1{ [, ]nm () ( ) (9)
And calculate the full correlation matrix of,
Vec(, )= =1 =1 { [, ]nm[, ] * ( () r(n,k))( () r(n,k))(10)
We can define the Eigen mode channel coupling matrices (CCM) as [16]:
, ={ , (, ) } (11)
11
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
We find that the Eigen mode CCM , is likewise independent of sub-carriers. According
to [17], the (UL) and (DL) statistical channelstate information (CSI) are usually reverse in
both time-division duplex (TDD) and frequency-division duplex (FDD) systems. Thus, we
can indicate the (UL) and (DL) CCMs as:
1
, = (, ) = (12)
, = , , + , (13)
Where , CM1 is the signal meant for the uth. The received signal of thuser in the th
sub-carrier can be as follows:
, = , , + =1, , , + u,(14)
The 5G gave us through the use of technology BDMA a lot of advantages, the important one
is the high speed in data transforming as compared with previous generation and the smart
use of send data instead of Wi-Fi technology and losing in power and band, and this leads to
increase in capacity and the number of user who can connect with the system, and keep the
bandwidth from dispersion by allocating beam (packets of data) directly to the subscribers
this allows us to send more data size whether video, audio, etc., this is the most important
part of the idea of BDMA [18]. It should also be noted that BDMA reduce latency
significantly compared to the fourth generation (4G) as well as previous generations. This
make a revolution in communication and data transform. Add to that BDMA solve problem
between cell overlapping and solve performance deterioration problems of subscriber at cell
that occurring in a cellular system. Taking into consideration radiation efficiency of the
antennas can be maximized when radiation pattern of the base station and radiation pattern
of the mobile station are designed to match each other [19], as for the disadvantage of
BDMAcan be summarized as follows:
7. Application
12
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
A. E-health: it can take advantage of this application to calculate and monitor the
patient's blood pressure as well as to know the pulse rate. His breathing by wearing
the devices assigned to the piece. This application enables the patient to reduce costs
by allowing patients to stay out and away from the care facilities [21].
B. Transportation routes: the usefulness of this application to participate in the car with
other cars with information on what comes in ways greater efficiency and a very large
safety.
C. Smart train can be more pleasant as travelers travelling on higher speed trains through
the vast areas and uninhabited, full 5Gnetwork can work.
D. at densely packed crowd, at an event of sport for example, enhanced the speed and
capacity can be Increases entertainment due to the Increases of the virtual reality
close to the truth.
8- CONCLUSION
In this paper we have surveyed 5G wireless technology phones. Like the 5G BDMA-based
technology that provides the best quality of service. And at the lowest cost to serve a greater
number of connections to the number of users without quality within the limited spectrum
available loss with increased system capacity. There are a lot of enchantment from 1G to 5G
wireless technology. BDMA is the latest technology used in the next generation. Some new
technologies has been added to wireless networks 5G, This makes the 5G wireless network
is more high-end than the 4G network, and more technical. It 5G will cover the world and
offers seamless service as its basic goal Like the 5G BDMA-based technology that provides
the best quality of service. And at the lowest cost to serve a greater number of connections
to the number of users without quality within the limited spectrum available loss with
increased system capacity compare with the. Also 5G will achieve its goals through the
efficient use of spectrum, dynamic allocation of broadband, transmission technology
upgrades and other aspects. Where we can say that a full update for 3G and 4G. Can 5G use
broadband more efficient to improve the transmission speed and the flow of information
within the time unit and have a huge Development on cloud computing, e-commerce, and
the wisdom of life related industries The use of (BDMA technology) in the 5G can improve
the capacity of system, and thus can increases the coverage of service on larger areas and
throughput of system. Compere with 5G millimeter wave technology that supports only LOS
(Line of Sight) propagation. Hence coverage is limited to LOS and loss of energy because of
higher at millimeter wave due to more number of radio frequency modules due to large
number of antennas. In BDMA technique BS transmit different beams with different
directions to MS without interference. Compared with Mobile Ad-hoc Networks (MANETs)
13
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
is the process of guiding the data packets from end to end, where it will be difficult in mobile
ad hoc networks because of the continued movement and the absence of centralized control
over all nodes (Mobile Station).
Reference
[2] Rohini C G, Satyanarayana, " Analysis of Beam Division Multiple Access in Massive
MIMO Communication Systems", National Level PG Project Symposium On Electronics &
Communication, Computer Science, 2016
[4] PriyaGoyal, Avtar Singh Buttar, "A Study on 5G Evolution and Revolution International
Journal of Computer Networks and Applications", Volume 2, Issue 2, March April (2015)
[7]T. S. Rappaport, " Millimeter Wave Mobile Communications for 5G", Digital Object
Identifier, 2013
[9] Dr. SNS Rajalakshmi, R. Marutha Veni1, "Mobile Ad hoc Network" International Journal
of Science and Research (IJSR), India Online, 2013
[10]Belding-Royer,E.M. and C.K. Toh,1999. A review ofcurrent routing protocols for ad-
hoc mobile wirelessnetworks. IEEE Personal Communication magazinepp: 46-55.
[11] Imthiyaz Ali, "BEAM DIVISION MULTIPLE ACCESS (BDMA) FOR 5G",
International Journal of Science and Research (IJSR), 2011
14
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
[13] Dong-ho cho, "Beam Division multiple system and method for mobile communication
system, Espacenet, 2010
[17] HeeWook Kim, Unhee Park, Kunseok Kang, Bon-Jun Ku, "Satellite Frequency Reuse
Method for Complementary Ground Components in an Integrated MSS System", ETRI
Daejon, Korea 305-350, 2013
[19] G. Barriac and U. Madhow, Space-time precoding for mean and convariance feedback:
Application to wideband OFDM, IEEE Trans. Commun., vol. 54, no. 1, pp. 96107, Jan.
2006.
[20] HeeWook Kim, Unhee Park, Kunseok Kang, Bon-Jun Ku, "Satellite Frequency Reuse
Method for Complementary Ground Components in an Integrated MSS System", ETRI
Daejon, Korea 305-350, 2013
[21] X. Li, S. Jin, and X. Q. Gao, Multi-user MIMO downlink eigen-mode transmission
over jointly correlated MIMO channels, Sci. China Inf. Sci., vol. 54, no. 10, pp. 21242137,
Oct. 2011.
[23] Ron Davies, "5G network technology'', EPRS | European Parliamentary Research
Service, 2014
15
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
2. INTRODUCTION
T
he fast growth in the Internet and the available image devices, such as digital
cameras and image scanners has led to a tremendous increase in the management
and organization demands of such digital libraries. Therefore, several kinds of
research have involved and introduced an application for the purpose of object
categorization. In fact, Visual Object Categorization (VOC) is considered one of the
16
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
most challenging applications; hence it took the researchers' attention. The most
common issue facing this application is the semantic gap, the differences between the
low-level features and the richness of human mind concept [3, 7].
Several types of research have introduced various solutions that involve the use of object
ontology or low-level features associated with the machine learning algorithms. With
respect to the low-level features, the researchers introduced three kinds of features:
color, texture, and shape. Mainly, the texture features have been widely utilized and
viewed as a fundamental solution for various applications, such as: remote sensing,
facial recognition, and object categorization [8].
However, the texture is seen as repeated patterns of information with regular intervals.
It also indicates the surface properties and object appearance. The review of the
literature shows that the there are four approaches that have introduced the extract the
texture features. These approaches include, namely, the Structural, Statistical, Model,
and Transform based features extraction [4].
In fact, the efficient methods for texture features extraction rely on the excellent analysis
to the local features. Mostly, some of the texture features extraction methods are based
on the pixel intensities while the other are based on the edge pixels. The Gray level Co-
occurrence Matrix (GLCM) extracts the texture features based on the relationship of the
pixels. There are three ways to extract the texture features of the GLCM method. These
ways are based on pixels neighboring relationship; i.e., first-order statistics, second-
order, and high-order statistics [5, 1].
Besides, two main factors were commonly used measure the texture information: (i) the
roughness and (ii) smoothness of the object surface. Therefore, numerous statistical
equations have been offered to measure the degree of roughness and smoothness of the
object surface. In addition, there are other factors which can add valuable information
to the texture features to measure the brightness and darkness of the texture [10]. In
contrast, to obtain the edge texture features, diverse methods were presented; as a case
in point is the Edge Histogram Descriptor (EHD) of MPEG-7 descriptors. Obviously,
this descriptor has various characteristics which made it well-known and broadly used
by several applications, such as: Content-Based Image Retrieval (CBIR) and Visual
Object Categorization (VOC) [11; 2].
In this paper work, a valuable comparative analysis between the intensity and edge based
texture features had been carried out. For the intensity-based texture features, two
methods are proposed; namely, Gradient, and Co-occurrence Matrix. Besides, for the
edge-based texture features, EHD is adopted to extract the texture features. Test results
indicated that the first 20 categories of Caltech 101 dataset, which was chosen, to
demonstrate the proposed methods performance.
17
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
8 2 0 8 2 2 4 2 1
2 4 0 2 4 0 2 2 0
0 0 4 2 0 4 1 0 2
(1,0 , 180 )
(1,90 , 270 )
(1,45 , 225 )
(c) (d) (e)
4 2 1
2 2 1
1 1 2
(1, 135 , 315 )
(f)
18
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
In fact, before calculating the co-occurrence matrix, the colors of the image are quantized
into N levels. The aim of performing the quantization step is to ignore the redundant
information and keep the adequate information as the human vision does. Besides, the co-
occurrence matrix will be calculated for each image band (Red, Green, Blue, and Gray). The
purpose of extracting the co-occurrence features from these bands is to capture every possible
information from the entire image. The following equations are applied to analyze the texture
features of the co-occurrence matrix [9].
1- Mean
(,)
= (1)
2- Standard Deviation
1 2
=
=1 ((, ) ) (2)
3- Skewness
1 3
((,))
=1
= (3)
3
4- Angular Second Moment or Energy
2
= (, ) (4)
5- Contrast
= ( )2 (, ) (5)
6- Correlation
{ (,)(,)}
= (6)
Where the are the means values and the are the standard deviation.
7- Entropy
= (, )(, ) (7)
8- Inverse Difference Moment
(,)
= 1+2() (8)
9- Variance
= ( )2 (, ) (9)
; (, )
10- Sum Average
= 2 =2 + () (10)
+ () = ,;+= (, ).
11- Sum Entropy
= 2 =2 + () log(+ ()) (11)
19
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
12- Homogeneity
(,)
= 1+|| (12)
13- Difference Entropy
= 1
=0 () log( ()) (13)
This set of mathematical equations has been used to measure the various characteristics
of the texture maps. These characteristics involve the following: homogeneity, regularity,
complexity, dependency, uniformity, correlations and others, which were constructed using
the co-occurrence matrix. In fact, in this research, two levels of relationships between the
neighboring pixels have used the first and third neighboring pixel. Therefore, the number of
features for each band will be 26 features, and the total number of features will be 104
features extracted from each image.
2.2. Gradient Texture Analysis: A Gradient is another texture map method, which uses the
edge density based on the pixel level contrast. In the literature, several methods have been
introduced to extract the edge map. Such methods can be later employed for different
purposes, such as features extraction, object segmentation, and texture analysis. In fact, the
edge is essentially based on the intensity change of an image. Moreover, good edges are
imperative to higher level processing. The edge detector is paramount in the area of computer
vision. Certainly, different methods were proposed to extract strong edges, including the first
and second order derivatives [6]. Simply, to construct the edge map, the relationship between
the neighboring pixels should be taken into account. These edges will be used later as texture
maps to be analyzed [8]. However, to extract the edges, two methods were used: the first and
the second order derivative.
In this research, the second order derivative is used to construct the texture maps. Similar
to the co-occurrence matrix, the colors of the images are quantized from 256 levels into N-
level. This process will improve the processing time and act as the human vision does.
Additionally, the texture maps will be constructed based on two areas, namely darkness and
brightness. The main purpose of using this principle is to measure the texture into two
different parts of the image. This can in turn give an indication of how the texture is
distributed in the image. The following equation illustrates the Gradient of the second order:
2
= ( + 1) + ( 1) + 2 () (14)
2
2
where represents the Second-order derivative, () represents the current pixel and
2
( + 1 ) and ( 1 ) represent the forward and backward pixels, respectively in (vertical,
horizontal and diagonal).
The most important purpose of using the second order derivative is to capture the strong
edges based on the different directions and values of the three color bands
20
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Apart from that, various statistical equations are used to measure both the dark ad bright
areas in this research. These statistical equations include the following: the Mean, Standard
Deviation, Skewness, Central Moment with Low Order, Short Run Emphasis, Long Run
Emphasis, Gray Level Non-uniformity, Run Length Non-uniformity, Run Percentage, Low
Gray Level Run Emphasis, High Gray Level Run Emphasis, Short Run Low Gray-Level
Emphasis, Short Run High Gray-Level Emphasis, Long Run Low Gray-Level Emphasis,
Long Run High Gray-Level Emphasis, Entropy and Energy. The following section
demonstrates this set of equations [9].
1. Central Moment
p = ni=0(x )p probability(x ) (15)
Where represents the moment of order, represents the expectation function,
represents the mean, represents the number of samples, and represents the input
sample.
2. Short Run Emphasis
(,)
=1 =1 ( )
2
= (16)
=1 =1 (,)
6. Run Percentage
1
=
=1 =1 (, ) (20)
Where n represent the number of samples.
7. Low Gray Level Run Emphasis
(,)
=1 =1 ( 2 )
= (21)
=1 =1 (,)
21
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
2 (,)
=1 =1 ( )
2
= (24)
=1 =1 (,)
FIGURE. 2: Image partitioning process of EHD, (a) Dividing the Image into 16 Sub-
images, (b) Dividing the Sub-Images Blocks.
22
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
(d) (e)
FIGURE 3: Edge Histogram Descriptor Filters, (a) Vertical Edge Filter, (b) Horizontal
Edge Filter, (c) Diagonal 45 Edge Filter, (d) Diagonal 135 Edge Filter, (e) Non-Directional
Edge Filter.
The last step, after building the histogram, is based on the strength edges. The histogram
distribution is normalized and is then quantized for a binary representation. To conclude,
this operation produces 80 bins of edge distributions that represent the entire image [2].
Figure 4 gives an illustration of the proposed texture feature extraction diagram.
After extracting the features by the proposed texture feature extraction methods, these
features will be proceeded by the Support Vector Machine (SVM) classifier to get the final
23
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
classification results. However, in this research, a libSVM with a Radial Basis Function
(RBF) has been utilized to achieve the final classification accuracy.
24
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
25
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
conclude, using the edges in obtaining the texture features can be considered more valuable
than using the intensity pixels for the real world images because the edges are more resistance
to the images effects and produce distinctive features.
6. CONCLUSION
Categorization and retrieving real world images are among the most channeling tasks in the
computer vision community. This is because of the great complicated objects and scenes.
However, in this research, a comparative study was carried out based on the real world image
dataset, called Caltech 101 dataset. The primary goal of this comparative study is to verify
the strength and weakness of the two main approaches in extracting the texture features,
which rely on edges and intensities. The results of the experiment reveal that the edge
histogram descriptor outperforms the other state-of-the-art methods. This is because EHD is
essentially based on edges in extracting the texture features that are much valuable with real
world images. Besides, the state-of-the-art methods, which are primarily based on the
intensities of pixels, are highly affected by the board variations of intensities. Lastly, the
standard deviation reveals that the proposed methods are not much stable with random
training and testing runs. This means that there is more than one template to represent each
class of Caltech 101 dataset. To expose how many templates each class contains, the
clustering technique can be appropriated for this purpose, a good suggestion for future work.
7. ACKNOWLEDGMENT
The authors would like to thank Allah for his guidance and inspiration.
8. REFERENCES
[1] Avramovi, A., evo, I. and Reljin I. 2015. Comparative analysis of texture
classification based low and high order local features. 23rd Telecommunication Forum
Telfor (TELFOR). Pp: 799 802.
[2] Ayad. H., Abdullah, S.N.H.S. and Abdullah, A. 2012. Visual Object Categorization
Based on Orientation Descriptor. Sixth Asia international conference on mathematical
modeling and computer simulation (ASM 2012). Bali, Indonesia, 29-31.
[3] Ayad, H., Abdulameer, M.H. George, L.E and Hassan, N.F. 2015. Descriptor Trends in
Texture Classification for Material Recognition. Research Journal of Applied Sciences,
Engineering and Technology. Vol. 10, Issue 10, Pp: 1089-1101.
[4] Belsare, A. D., Mushrif, M. M., Pangarkar, M. A. and Meshram, N. 2015. Classification
of Breast Cancer Histopathology Images using Texture Feature Analysis. IEEE Region
10 Conference (TENCON). Pp: 1-5.
[5] Jabid. T., Mohammadt, T., Ahsan, T., Abdullah-AI-Wadud M. and Chae, O. 2011. An
Edge-Texture based Moving Object Detection for Video Content Based
Application.14th International Conference on Computer and Information Technology.
Pp: 112 116.
26
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
[6] Jain, R., Kasturi, R. and Schunck, B.G. 1995."Machine vision." McGraw-Hill, New York,
NY, USA.
[7] Liua, Y., Zhanga,D., Lua, G. and Mab, W-Y. 2007. A survey of content-based image
retrieval with high-level semantics. Pattern Recognition, Vol. 40, Pp: 262 282,
[8] Nadernejad, E. 2008. Edge Detection Techniques: Evaluations and Comparisons.
Applied Mathematical Sciences, Vol. 2, No.31, Pp: 1507 1520.
[9] Salam, H.I. A. 2008. Content-Based Image Retrieval System Using Fuzzy Rule. Master
thesis. Collogue of Science, Al-Nahrain University. Iraq.
[10] Satpathy, A., Jiang, X., and Eng., H-L. 2014. LBP-Based Edge-Texture Features for
Object Recognition. IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 23.
Pp: 1953 1964.
[11] Won, C.S., Park, D. K. and Park, S-J. 2002. Efficient Use of MPEG-7 Edge Histogram
Descriptor. ETRI Journal. Vol. 24, Issue 1.
27
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
N
Nowadays Internet of Vehicles (IoV) has positively changed the transportation
systems. Indeed, Intelligent vehicles that have CPU and transceiver device to
communicate with each other are the main components of that system [1]. These
intelligent vehicles help in providing safe and smart environment. IoV, is subclass of Internet of
Things (IoT) by which transportation system will be more intelligent. IoVs and VANETs are
28
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
associated terms. While VANETs are used in numerous applications such as automobiles speed
monitoring, traffic jam avoidance, best route finding, and outside to vehicles communication [2].
VANET is subclass of IoV, where VANET is local network while vehicles in IoV need to global ID.
Internet services might be required in IoV[3]. A large number of vehicles are included in IoVs and
some roadside stations that could be deployed in an ad hoc or cellular mode. There are three
communication scenarios in IoVs. These are Vehicles to vehicles, vehicles to roadsides and roadsides
to roadsides [4].
However, vehicles are severely constrained in terms of mobility, direction and dynamic topology.
Therefore, realistic simulation needs to be considered to reduce the non-realism. Numerous methods
have been proposed to achieve some of those goals through different strategies. Each strategy can be
used to achieve some efficiencies depending on the application for which the VANET is designed.
The big challenge is how to simulate realistic vehicular networks because of their constrains [5]. In
this event, virtual reality can also be used in increasing the realism of the simulations [6]. Several
simulations are available to simulate IoVs or VANETs. Nonetheless, the realistic is not considered
in all. This paper will focus on developing urban scenario for Erbil city. This scenario has been
proposed, built, promoted, analyzed and discussed in three sequenced stages. The First stage is to
prepare a real map which is downloaded from OpenStreetMap website. The second stage will be
assigned to design a realistic traffic simulation using SUM0. The last stage is related to link SUMO
with VEINS under OMNeT++ environment for building the network. The rest structure of this paper
is divided into sixth sections in addition to the 1st section. The second section is to mention the related
works that have been done so far. The third section is to discuss the VANET simulations. The
proposed system will be investigated in the fourth section. The fifth section will be about discussing
the results. Conclusion will be the last section.
2. Related Works
Several mobility models are available to model traffic of vehicles. However, not all of these models
take in account specific characteristics of traffic urban scenario. As a result the simulation could be
unrealistic [7]. Some of them are unidirectional simulations and others are bidirectional simulations.
The latter means that there are two simulations are coupled to achieve the realism. Many
unidirectional simulators have been designed for vehicular network [8]. NS2 is used to simulate
network of vehicles [9]. However traffic simulation can be achieved through another simulation.
GloMoSim is another simulator that has ability to simulate the mobility[10]. It is designed to simulate
wired and wireless networks. VanetMobSim is widely used to simulate vehicular networks[11]. It
29
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
represents an extension of the CanuMobiSim. NetLogo can be also used to simulate the behavior of
vehicles [12]. Authors in [13] suggest a road model approach using NetLogo.
On the other hand, bi-directionally coupled simulations have been also proposed to combine two
simulations. First one is to simulate road traffic whereas another one is to simulate the network. In
[14], SUMO is suggested as a traffic simulation. It is coupled with NS-3 to simulate the network. In
[15], authors simulate the road traffic using VanetMobSim simulation and NS-2 as a network
simulation. VISSIM is derived from the German sentence "Verkehr In Stdten - SIMulationsmodell"
(that means "Traffic in cities - simulation model"). It is coupled with NS-2 as a realistic simulation
for VANETs [16].
The road traffic simulations can be classified into three classes according to the granularity in which
the road traffic will be simulated. These classes are macroscopic, mesoscopic and microscopic [7].
The first two classes have not an offer to simulate the single vehicle behavior and their interactions
with other vehicles, whereas the microscopic model can do it. SUMO is microscopic model which is
widely used in road traffic simulations. It can send sequence of commands and vehicles positions to
OMNET++ module. The latter can easily react to create new nodes, to delete nodes that reached to
the destinations and to move nodes depending on their behaviors in SUMO.
30
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
This section will describe the implementation of the realistic simulation. The simulation will be done
in two phases. The first phase is to simulate the road traffic in Erbil city (The capital of Iraqs
Kurdistan) using SUMO simulator. The second phase is to use the network simulation VEINS
framework, which is an OMNET++ framework. Both simulators will be operated in parallel. The
proposed bi-directional coupled simulation system in this study is illustrated in figure (1).
Start
Convert the map into xml file Build the veins project
Even though it is possible to create network files manually, these file could be unrealistic. So
obtaining realistic simulation requires a real map. The openstreetmap web site provides such this real
map as .osm file [17]. This map is converted into net.xml file using SUMO using netconvert
command.. Figure (2) shows the Erbil city map in (a) and the network file in (b).
The network file defines all edges that link the start points and the end points of roads.
3.2 Road traffic Simulation (SUMO)
SUMO is an open source traffic simulator. Microscopic and mobility model are used in SUMO. It
has been developed by the German Aerospace Center (Institute of Transportation Systems) [7]. Each
vehicle has a unique path defining its source and its destination. There are four main files should be
created in SUMO. These are network file to define the road network, trip file to define the start and
end point for each vehicle, route file to define vehicles and their routes, and configuration file to
control all the mentioned previously files. As the network file is mentioned in the previous section,
the rest of files will be discussed in the next sections.
- Creating trip file: As it is discussed previously the network file defines all edges in the
network. However, vehicles paths are still not defined. For this reason trip file is responsible
to define a path for each vehicle. As it is seen trip file has parameters like route id, departure
vehicle id, and starting and ending lane.
- Creating route file: The route file defines the information of the route a vehicle would travel
through. Since each vehicle should have the route and it may have many lanes, it is not
possible to define this file manually. So SUMO provides a facility to generate this file from
the network file and trip file which are defined previously.
- Creating configuration file: Creating a configuration file is a necessary step to link all the
created files.
There are many network available simulators. Some of them are open source whereas others are
commercial. Due to extensive cost of testing the network in real world, network simulation is used.
Most of the previous projects use the open source simulator OMNET++ and its framework VEINS
32
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
to simulate the vehicles network. It contains two main types of files. They are .ned files and .ini file.
The former is to describe the network whereas the latter is to include the configuration of the network.
The output of SUMO will be used as input to VEINS in parallel [18].
3.4 Linking SUMO and VEINS
SUMO contains Traffic Control Inteface (TraCI) module for OMNET++. This module contains a
small daemon, sumo-lunched, which makes running of coupled simulations easier and simpler. The
sumo-lunched daemon is listening for each incoming request. For this process TCP connection is
needed. In this connection SUMO will operate as server and OMNET as client. To achieve such that
connection opening port is also required.
At this stage, both simulators are ready to start in parallel as illustrated in figure (3).
1000 vehicles are used in the road traffic simulation (SUMO). However, 200 vehicles along 4 km
road are traced in the network simulation (VEINS). 1026.4 s is elapsed time for the network
simulation. In VEINS, 40448 events have occurred ranging from packet sending, waiting time and
changing positions. Figures (4 &5) show the start and end time for each vehicle.
Time
Vehicles
Vehicles
Busy time for each vehicle is collected and shown in figure (6).
Time/ sec
Vehicles
Each vehicle changes its behavior according to the behavior of others and traffic conditions. So
each vehicle may change its speed. Where Max speed is setup to 60km/h in this project.
As it could happen in any network, some packets may be lost. If there is one packet sent by every
vehicle, there will be 199 packets should be received by each vehicle. According to these results,
decreasing the lost packets is recommended to increase the reliability of the system. So figure (7)
shows the number of lost packets in the network.
Packets
Vehicle ID
5. Conclusion
Internet of vehicles IoVs are networks of distributed autonomous vehicles and roadside stations that
can cooperate together for sharing physical or traffic conditions. It has been regarded that the
transportation systems have a significant impact in many countries. On the other side, using advance
technology to improve intelligent traffic has been available. This encourages researchers to pay their
attention to develop the transportation systems. As long as simulation of road traffic system is a
considerable issue due to high mobility that characterizes this system. So there is a need to realistic
simulation to achieve some realism. This paper presents an example of realistic simulation to
investigate the road traffic in Erbil city by combining the road traffic simulator (SUMO) and the
network simulator (VEINS). The behavior of vehicles can be enhanced according to some results of
bi-directionally coupled simulations. This project will also contribute in investigating the important
cases and challenges of the transportation system. It will also contribute in decreasing the cost and
the time of studying such those cases. In fact, the real world experiments could be risky, costly and
time consuming. Moreover, this project may help in developing Erbil city. Extending roads and
predicting challenges can be investigated before the costly real world experiments. Besides, in term
of future work, the road traffic simulations can be brought to life by using Virtual reality tools. These
tools may give more realism to the simulations.
34
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
References
1. Botta, A., et al., Integration of Cloud computing and Internet of Things: A survey. Future
Generation Computer Systems, 2016. 56: p. 684-700.
2. Avinash Devare, et al., A Survey on Internet of Things for Smart Vehicles. IJRSET, 2016.
5(2).
3. Keertikumar, M., M. Shubham, and R.M. Banakar. Evolution of IoT in smart vehicles: An
overview. in 2015 International Conference on Green Computing and Internet of Things
(ICGCIoT). 2015.
4. Rawat, D.B. and G. Yan, Infrastructures in vehicular communications: Status, challenges
and perspectives. IGI Global, 2010.
5. Al-Sultan, S., et al., A comprehensive survey on vehicular Ad Hoc network. Journal of
Network and Computer Applications, 2014. 37: p. 380-392.
6. Rahimian, P., et al. Using a virtual environment to study the impact of sending traffic alerts
to texting pedestrians. in Virtual Reality (VR), 2016 IEEE. 2016. IEEE.
7. Sommer, C., R. German, and F. Dressler, Bidirectionally coupled network and road traffic
simulation for improved IVC analysis. IEEE Transactions on Mobile Computing, 2011.
10(1): p. 3-15.
8. Martinez, F.J., et al., A survey and comparative study of simulators for vehicular ad hoc
networks (VANETs). Wireless Communications and Mobile Computing, 2011. 11(7): p.
813-828.
9. Sebastian, N.V. and T. Jeyaprakash, Appraising Vehicular ADHOC Networks Routing
Protocols Using NS2. 2014.
10. Hassan, A., VANET simulation. 2009, Hgskolan i Halmstad/Sektionen fr
Informationsvetenskap, Data-och Elektroteknik (IDE).
11. Alwakeel, A.M., Implementations Of The DTM, DADCQ And SLAB VANET Broadcast
Protocols For The Ns-3 Simulator. 2016, FLORIDA ATLANTIC UNIVERSITY.
12. Shanshan, W. and Z. Chunxiao. NetLogo Based Model for VANET Behaviors Dynamic
Research. in Intelligent System Design and Engineering Applications (ISDEA), 2013 Third
International Conference on. 2013. IEEE.
13. Hasson, S.T. and Z.Y. Hasan, Simulating Road Modeling Approachs in Vanet
Environment Using Net Logo. Research Journal of Applied Sciences, 2016. 11(10): p.
1130-1136.
14. Su, Y., H. Cai, and J. Shi. An improved realistic mobility model and mechanism for VANET
based on SUMO and NS3 collaborative simulations. in Parallel and Distributed Systems
(ICPADS), 2014 20th IEEE International Conference on. 2014. IEEE.
15. Poonia, R.C. and D. Bhargava, A Review of Coupling Simulator for Vehicular Ad-hoc
Networks. 2016.
16. Sun, J., Y. Yang, and K. Li, Integrated coupling of road traffic and network simulation for
realistic emulation of connected vehicle applications. Simulation, 2016. 92(5): p. 447-457.
17. Openstreetmap. [cited 2017 7th Feb. ]; Available from: www.openstreetmap.org.
18. VEINS. [cited 2017 8th Feb. ]; Available from: http://veins.car2x.org/documentation/.
35
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Ali M. Humada
Electricity Production Directorate of Salahaldeen, Ministry of Electricity, 34007 Baiji,
Iraqalimhm82@gmail.com
1. INTRODUCTION
T
he PV solar cells are an evolving technology. The efficiencies of the solar cells
in the late 2015 reached 34.7%(Ali M Humada, Hojabri, Hamada, Samsuri, &
Ahmed, 2016a). Therefore, more focusing efforts installed via the world, its
investments increased by 300% at the end of 2015 compared to
2012(Abdelsalam, Massoud, Ahmed, & Enjeti, 2011). On the other hand, high oil prices,
pollution and political pressured to reduce carbon dioxide emissions are a few of the major
reasons that drive governments to consider renewable energy sources. The increasing
demand of electric energy drives nations to consider renewable and sustainable energies.
Several inverter topologies are being introduced to minimize losses and cost as well as
provide a better performance(Ali Mahmood Humada et al.). With the demand for more
reliable solar maximum power point tracking (MPPT), further work should be considered
regarding the control aspects of the inverter to overcome the drawback of the traditional hill-
climbing techniques. The PV solar cell model a challenging application field since the
36
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
changes in the solar irradiance and the temperature are not known. This nonlinear and highly
complex system of a grid-connected PV cells can be stimulated to control engineers.
Various adaptive control methods, both considering the possible variations (intelligent
control) (De Brito, Galotto Jr, Sampaio, de Azevedo e Melo, & Canesin, 2013; Dorofte,
Borup, & Blaabjerg, 2005; Elgendy, Zahawi, & Atkinson, 2012)and without considering the
possible variations (hill climbing) have been studied (Ishaque & Salam, 2013; Ji et al., 2011;
Jiang, Maskell, & Patra, 2013). PV cell inputs are highly indeterminate; it is not possible to
model the system mathematically. Therefore, there is a need for implementing control
method can consider the following issues,the inability of modelling the mathematical system
accurately, operate under a wide operating range, adaptation to unforeseen system changing
parameters and conditions, insensitivity to nonlinearity,simplicity of implementation and
design, and finally decrease the oscillation around the maximum power point.
Intelligent control systems such as artificial neural networks (ANNs), fuzzy logic (FL)
as well as meta-heuristic optimization methods meet the characteristics listed above. The
intelligent control has presented some promising results. Commonly, researchers would use
only one intelligent control technique, ANNs, FL, or evolutionary computing. The
combination of ANN and FL has proven to be effective in several applications. The ANN
compensates for the lack of learning capability and the limited adaptability of the FL. The
FL, on the other hand, is a great way to model linguistic information(Zadeh, 1996).
Combining the two methodologies provide a hybrid structure that is capable of dealing with
systems involving different types of knowledge. Therefore, the proposed
methodimplemented to solve the problems of the hill climbing methods such as, accuracy of
tracking and decreasing the oscillation around the maximum power point, to provide finally
an acceptable result compared with the most used tracking methods (P&O).
37
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Figure 1: Two PV modules connected in series, when one module shaded and another operate with normal condition.
Figure 2: The IV characteristic curve of a PV string, two module (Module 1 and Module
2) connected in series. In partial shadowing condition, the radiance on every
PV module as follows: Module1=400 W/m2 and Module 2 = 1000 W/m2. In
the normal condition: M1 = M2= 1000 W/m2.
A different irradiance value (250 W/m2, 750 W/m2) is received by each PV module.
The PV curves are given in Figure 3, which likewise shows that, in the PV curve for the
module string, there is only one MPP that does not have bypass diodes (Ali M Humada,
Hojabri, Sulaiman, Hamada, & Ahmed, 2016). Therefore, without bypass diodes, number of
MPPs remain the same, similar to the case when there is a uniform irradiance (at 250 W/m2)
on these two modules.
A few researchers (Bidram, Davoudi, & Balog, 2012; El-Dein, Kazerani, & Salama, 2013;
Storey, Wilson, & Bagnall, 2014) made suggestions using a bypass diode for every solar
cell towards reducing the consequence of the partial shading within a PV module (i.e. power
loss), but this would bring additional complexity and cost to the module.
3. MPPT UNDER PARTIALLY SHADED CONDITIONS
As demonstrated above, towards protecting the PV panel from hot spots caused by the
module which acts as a load and consuming power, the addition of bypass diodes to
commercial PV modules is undertaken. For the PV panel protection, two bypass diodes (i.e.
Diode 1 and Diode 2) are added to the PV system; this is done through their parallel
38
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
connection with the PV modules (Figure 1). Additionally, towards preventing the reverse
current from the loader unbalance the current ow from other parallel PV strings, the
blocking diode is typically connected in the series PV string. Because of their series
connection for the PV string that has bypass diodes, the current that passes through these two
modules of different irradiance is equal. As such, this assemblys IV curve (in green dotted
line) can be derived through the addition of the voltages across them, while, at the same time,
the current value constant is kept constant (Figure 2). From these two modules IV curve,
there is evidence showing the formation of the two knee points, which then generates two
local maxima (Global 1 and Global 2) in the PV curve generated therein (Figure 3).
150
G3
Normal conditions (uniform)
Module 2
With baypass diode
Without baypass diode
P2
Module 1
100
Power (Watt)
P1
50 G1 G2
0
0 5 10 15 20 25 30
Voltage (Volt)
Figure 3: The PV characteristic curve of a string with the same connection and weather
conditions in Figure 1. However, P1 and P2 represent the PV modules in
normal condition and partial shading condition, respectively.
39
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The system implements a feed-forward architecture where the flow of information moves
in one direction (input to output). The back propagation learning algorithm is used to train
the weights of the hidden layers. The algorithm solves an optimization problem based on the
radiant descent law, which involves the minimization of the cumulative error.
1 q
E(k) =
2
i 1
[t (k ) o(k )]2 (1)
1 q
minE(k) = min i 1
[t (k ) o(k )]2 (2)
2
w in eqn. (3) will be the delta rule for updating rules allowing for minimization of (2).
e(k ) e(k )
w = - (3)
w w
is the gradient of the error E(k) with respect to w. is the learning rate which is fixed
throughout the simulation. The learning rate is initialed with a small value to avoid
convergence problems. Usually a momentum is added to provide fast convergence and fewer
oscillations. The momentum does not account for in the EMTP simulations. Therefore the
weigh updates will be according to 4. The first step in the training is initializing the weights
and the threshold.
The threshold of all hidden layers is initialized to 0.5 and the weights are initialized to
0.25. The weights are initialized to a small random number, hence why the 0.25 is chosen.
40
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Since the training is done online, the input pattern obtained from the voltage and power
profile of the PV model. The output of the NF system is compared to the power output of the
PV model and the error is calculated for each sampling period. The error is then propagated
backward to each layer using eqn. (3), and the weights are updated. The maximum tolerable
error is set to be 1% tentatively.
41
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The ability of tracking the MPP point throughthe above presented shadow condition was
tested by using the proposed method. The results of the tracking presented in Figures 7 and
8.
Figure 7. Result of MPP tracking by using the proposed method to compare with ideal
MPP.
42
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Figure 7 presents the tracking process by using the proposed method, while Figure 8presents
the results by using the comparative method, MPPT based on P&O algorithm. By
comparison, we can see that the proposed method, Figure 8 tracked the maximum power
point before the time 1 second, however, in the comparative method, P&O method, it was
only able to track the MPP at 1.25 second. In addition, the over shot value of the proposed
method was less than the comparative method by around 50%. Therefore the proposed
method could be supposed as a novel method when compared with an efficient method like
P&O method.
____Ideal
____P&O
Figure 8: Result of MPP tracking by using the P&O algorithm to compare with ideal MPP.
CONCLUSION
A hybrid ANN-Fuzzy optimization method implemented in this study to track the maximum
power point of a PV system within shadow conditions. In this method, applied a hybrid
algorithmto assure the ability to recover the effects of shadow conditions in PV cells, which
isthe main issue in the PV installation.The proposed method has assuredits abilityof attaining
the steady state case and fast tracking time, compared with the conventional P&O method.
Also,the results showed that the proposed method could track the MPP at any condition and
day time with fast time response and low oscillation compare with the P&O method.
REFERENCES
Abdelsalam, A. K., Massoud, A. M., Ahmed, S., & Enjeti, P. (2011). High-performance adaptive
perturb and observe MPPT technique for photovoltaic-based microgrids. Power
Electronics, IEEE Transactions on, 26(4), 1010-1021.
Bidram, A., Davoudi, A., & Balog, R. S. (2012). Control and circuit techniques to mitigate partial
shading effects in photovoltaic arrays. Photovoltaics, IEEE Journal of, 2(4), 532-546.
De Brito, M. A. G., Galotto Jr, L., Sampaio, L. P., de Azevedo e Melo, G., & Canesin, C. A. (2013).
Evaluation of the main MPPT techniques for photovoltaic applications. Industrial
Electronics, IEEE Transactions on, 60(3), 1156-1167.
43
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Dorofte, C., Borup, U., & Blaabjerg, F. (2005). A combined two-method MPPT control scheme for
grid-connected photovoltaic systems. Paper presented at the Power electronics and
applications, 2005 European conference on.
El-Dein, M. S., Kazerani, M., & Salama, M. (2013). Optimal photovoltaic array reconfiguration to
reduce partial shading losses. Sustainable Energy, IEEE transactions on, 4(1), 145-153.
Elgendy, M., Zahawi, B., & Atkinson, D. J. (2012). Assessment of perturb and observe MPPT
algorithm implementation techniques for PV pumping applications. Sustainable Energy,
IEEE transactions on, 3(1), 21-33.
Humada, A. M., Hojabri, M., Hamada, H. M., Samsuri, F. B., & Ahmed, M. N. (2016a). Performance
evaluation of two PV technologies (c-Si and CIS) for building integrated photovoltaic based
on tropical climate condition: A case study in Malaysia. Energy and Buildings.
Humada, A. M., Hojabri, M., Mohamed, M. B., AL-Duliamy, M. N. A., Sulaiman, M. H. B., &
Akorede, M. F. Reconfiguration Method Based on DC/DC Central Converter within
Different Mismatch Conditions.
Humada, A. M., Hojabri, M., Sulaiman, M. H. B., Hamada, H. M., & Ahmed, M. N. (2016).
Photovoltaic Grid-Connected Modeling and Characterization Based on Experimental
Results. PloS one, 11(4), e0152766.
Ishaque, K., & Salam, Z. (2013). A review of maximum power point tracking techniques of PV
system for uniform insolation and partial shading condition. Renewable and Sustainable
Energy Reviews, 19, 475-488.
Ji, Y.-H., Jung, D.-Y., Kim, J.-G., Kim, J.-H., Lee, T.-W., & Won, C.-Y. (2011). A real maximum power
point tracking method for mismatching compensation in PV array under partially shaded
conditions. Power Electronics, IEEE Transactions on, 26(4), 1001-1009.
Jiang, L. L., Maskell, D. L., & Patra, J. C. (2013). A novel ant colony optimization-based maximum
power point tracking for photovoltaic systems under partially shaded conditions. Energy
and Buildings, 58, 227-236.
Storey, J., Wilson, P. R., & Bagnall, D. (2014). The optimized-string dynamic photovoltaic array.
Power Electronics, IEEE Transactions on, 29(4), 1768-1776.
Zadeh, L. A. (1996). Fuzzy logic= computing with words. IEEE transactions on fuzzy systems, 4(2),
103-111.
44
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
F rom different countries and having a variety interest and perspective, millions of
OSN user are doing huge actives every day. Activities, such as uploading
emotional information, downloading applications, and sharing or disclosing
private information are attractive to attackers. Such activities make the job of intruders and
system breakers very easy to find gaps and vulnerabilities among users and systems. Existing
of such types of OSN user activities are changing the trend direction of attackers policies
from misusing the systems vulnerabilities to misuse users vulnerabilities. Such attackers
trend encouraged researchers to focus mostly on OSN behaviors and attackers fingerprint
analysis[1].
Most researchers provided security solutions in the form of advice and awareness so that
OSN users can follow them for keeping their systems clean. Solutions that presented in the
text format are included many security and privacy related terminologies [2-4]. To
understand and follow these solutions, readers need to have good knowledge and skills about
systems and security issues, which most OSN users are not familiar with them. Moreover,
explaining a problem with texts cant give users a measurable indicator for their vulnerability
level. Therefore, OSN users need simple and understandable solutions with some measurable
45
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
indicators about their gaps and vulnerabilities. At the same time, it is necessary to teach OSN
users the behaviors that make them disclose to attackers. Also, users should know which
misused behaviors they have and at what vulnerability level they are.
This work focusing more on identifying the level and the rate of vulnerability of an OSN
user. The rest of the work is going like this. Section-2 provides the some works that achieved
in this field to show how researchers provided their solutions to OSN users, and expected
gap that not solved yet. Section-3, provides the concept of the secret sharing approach and
the point where crosses the concept of OSN vulnerability identification. Section-4 and later
show the process of building the model from the scratch, and some results.
2. Literature Review
In the recent years, the use of OSNs has increased dramatically. People find OSNs very
attractive as they offer many services, such as virtual relations with persons having similar
hobbies and backgrounds. Facebook, for example, currently has more than 1.39 billion active
members. Due to the portability of the current devices, location and time limitations are not
challenging the OSN users anymore to connect OSN websites. Each user has allowed doing
whatever activities he/she likes over there. Moreover, every day OSN websites are providing
new services and facilities for their users. With such availability, Internet users can stay
connecting OSN website more and more times, and can do wider and wider range of
activities. For example, users on FB doing around 3.21 billion activities per day. Of course,
not all activities are clean in the viewpoint of security and privacy standards[5].
The variety of users, activities, and even OSN websites facilitate the work of attackers to
find a number of gaps to systems and penetrating more number of users and systems.
Attackers and intruders now are learned to get a ride over systems through OSN users
vulnerability rather than systems vulnerability. Such trend changed the direction of
researching toward analyzing the users behavior more than operating systems behavior. In
such studies, the aims were not for improving the systems, however, they aimed to improve
the users behaviors. Therefore, most works provided security and privacy solutions to OSN
users [6, 7]. However, only a few of OSN users can understand these solutions perfectly.
To simply the solutions for users, most works classified the attacks and threats on OSN
users. They even sub-classify them into security related and privacy related works [6, 8-12].
The studies usually provided an overview of the types of OSN attacks. They explained the
possibility of those threats to users; furthermore, they provided recommendations and
suggestions as solutions for OSN users to protect their privacy and security. A study
presented by researchers[7] and they perfectly defined four groups of threats and attacks. In
that study, the authors offered many commercial and scientific solutions for OSN users. In
other studies [11, 13], privacy, security, and users behavior were discussed. The works
focused on one type of user vulnerability, namely Third Party Applications (TPAs). The
authors of both studies highlighted the unique security and privacy design challenges posed
by the core functionalities of OSNs, and some opportunities for utilizing social network
theory to mitigate these design conflicts and provide possible solutions to limit the
information disclosure. For both cases, it is difficult for users to understand and use those
models and theories, as they are not sufficiently clear, and users would need plenty of time
to learn them.
46
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
On the other hand, users need to know their vulnerability level while they are active on
OSNs. This could be done through studying the policies of the OSN based attacks and the
vulnerabilities that opened by OSN users for those attackers. The problem is how to calculate
the vulnerabilities so that a model can decide a user is disclosed or not. A linear model has
been designed by [5] and attached to Artificial Neural Network to compute the rate of
vulnerability. This work presents a Mutli-Secrete Sharing (MSS) approach to reveal the
vulnerability level of a user.
47
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
penetrate systems. Table 1 shows mapping between the required model and the proposed
scheme terminologies.
The work of these three parts of the OSN user vulnerability identification regarding the
Table 1 is going like this. An OSN user has V vulnerability, which is considered as an original
message in Shamirs Secret Sharing Scheme. When the user does some activities on OSN
platform, some vulnerabilities (v) are disclosed and become public for attackers. The level
of publicity of each vulnerability depend on the frequency rate of doing that vulnerability
which rates by the users themselves. To reconstruct the original message V by an attacker, a
t number of v elements inside the V should be found.
A. Announcement Algorithm
1. The set of all available vulnerabilities V will be initialized.
2. For any vi inside V, there is a corresponding weigh wi shows the degree of risks
that caused by the vi .
3. An OSN user dose some activities that announces all or a part of vulnerabilities of
the set V, crating Va .
4. Equation (1) is using to compute the final rate of the vulnerability for an OSN
users caused by a Va number of vulnerabilities.
48
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
3.3. Dataset
This work is evaluating the OSN user behaviors. To start with, the work needs a set of
dataset that collecting the user behaviors. This process needs to distribute a questionnaire
sheets among OSN users and ask them about their activities they do. This work depends on
a dataset that used by [5]. The set covered 18 attack types distributed over 32 policies and
vulnerabilities. The type of attacks that covered by that are Spams, XXS and CSRF attacks,
Phishing, Internet Fraud, Clickjacking, De-anonymous, Face Recognize, SocialBot, Identity
Clone, Inference Attack, Information Leakage, Location Leakage, Socware, Online
Predators, and Cyberbullying. There are many behaviors that bring risks to users beside
systems, such behaviors called Risky Behaviors. With all these attacks and risks, there are
many unwanted software called malicious software (malwares). Possibility of becoming
vulnerable to malwares increases with increase of doing many risky behaviors and activities.
The dataset has built a nice relation between each type of attack and the vulnerabilities of the
OSN users. Table 2 explains that each attack is associating with at least more than five
vulnerabilities. The table shows the maximum number of vulnerability that an attack can
associate with them is 17.
A10
A11
A12
A13
A14
A15
A16
A17
A18
A1
A2
A3
A4
A5
A6
A7
A8
A9
Vulnerabilitie
Number of
12
11
11
12
12
11
25
17
11
9
7
s
There are five levels (from 1 to 5) of the risk that a threat may attack or penetrate a system.
A user at level 1 to 2 in not considered as vulnerability. However, users with levels of 3 to 5
degree are considered as vulnerable. The dataset consists of 705 observations collected in
two different countries.
4. Scheme Analysis
The proposed scheme should show a good permeance, and this section analysis this
performance in the viewpoint of the responding of the scheme to cases that given in the used
dataset. To analysis the scheme, this work will consider a case from the dataset as example
of evaluation OSN user behaviors. Table 3 shows the situation of a user. The table shows
that the behavior of this user is open for 16 vulnerabilities. For example, v1, v2 are considered
as vulnerable, while v3 is not considered as risky.
3 4 2 3 2 3 3 3 1 2 2 4 1 2 3 5 4 2 2 1 3 5 3 2 5 2 3 3 3 1
49
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Through both parts of the algorithm, it could be easy to identify which vulnerability(s) a
user may have, and what is the rate, and finally awareness is already exist for those
vulnerabilities. Table 4 shows the main differences between the performance if this work
with two other recent works.
Revealing Calculation
Rate of
Schemes and approaches Awareness Type of of
Vulnerability
attacks vulnerability
[5] No Yes No Linearly
[4] Yes No No NA
This work Yes Yes Yes Polynomial
5. CONCLUSION
OSN user vulnerability becomes a direct target for attackers to penetrate system rather
than systems vulnerability. Attackers may get advantage for more than one vulnerability to
get over the control of a system. Studies showed that three measures are important for an
OSN user; (1) awareness (2) rate of vulnerability of a user (3) type of attack that brings
threats for a use. The out performance of this work is showing that no work can include all
these three measures in one work. Moreover, the linearity of computing the rate of the work
is primitive, because an impact of single vulnerability on the risk degree should be increase
nonlinearly (not linearly) if second vulnerability is found be a threat.
6. ACKNOWLEDGEMENTS
This work wants to thank both researchers of the work [5] to provide the dataset of that
collected by them to be used by this work.
7. REFERENCES
3. Savage, D., et al., Anomaly detection in online social networks. Social Networks,
2014. 39: p. 62-70.
50
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
5. Abubaker, F.R. and P.S. Boluk. An Intelligent Model for Vulnerability Analysis of
Social Media User. in Future Internet of Things and Cloud Workshops (FiCloudW),
IEEE International Conference on. 2016. IEEE.
7. Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and
Solutions. 2013.
8. Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and
Solutions. Communications Surveys & Tutorials, IEEE, 2014. 16(4): p. 2019-2036.
9. Gao, H., et al., Security issues in online social networks. Internet Computing, IEEE,
2011. 15(4): p. 56-63.
10. Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER
BEHAVIORS AND THIRD-PARTY APPLICATIONS. 2014.
11. Zhang, C., et al., Privacy and security for online social networks: challenges and
opportunities. Network, IEEE, 2010. 24(4): p. 13-18.
12. Guha, S., K. Tang, and P. Francis. NOYB: Privacy in online social networks. in
Proceedings of the first workshop on Online social networks. 2008. ACM.
13. Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER
BEHAVIORS AND THIRD-PARTY APPLICATIONS.
51
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
52
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
T
here are a lot of governmental organizations in Kurdistan Region that are active
in computer technologies and make use of them in their systems. By doing this,
organizations use this valuable data for information technology because of its
efficiency and productivity. At present, information technology is among most indispensable
services in the daily life and enhancing general issues, disclosure, transparency and work
efficiently to help improve the use of public resources of the government and protecting the
public funds from wastage through a comprehensive and independent oversight to help future
planning. Information technology tools lead to reduce cost, time and effort, and enhance the
efficiency of the work, and other issues that positively reflected on the general performance
of the government.
Because of the importance of this topic, this paper had been prepared to know the
accounting information system and its impact on the accounting system performance in
Kurdistan Region to do the role of accounting system in an efficiency way in the financial
and administrative control, so the governmental units can execute their role and auditing on
the institutions activities according to the allocations that specified in the budget to reduce
the financial corruption. Studying the electronic accounting information system considered
as an important subjects in various of business sectors, and especially in governmental
sectors, so that the world will direct to use and implement the electronic system in different
economic sectors, the thing that makes the governmental sector to improve their accounting
systems and use the information technology and trends towards the e-government, to take
the advantages of the benefits for the electronic systems which are the speed, accuracy, and
provide the suitable information to manage the governmental financial administrative. Where
the electronic systems contribute to providing the time to finish an extra processing and
achieve the accuracy in completion of the transactions. Information technology provides the
suitable information to prepare the public budget to execute it and control the execution. In
addition, IT contribute in to manage the general policies for the government. To achieve the
general benefits from the electronic systems the basic components should be provided, these
components contribute to achieving the benefits from the e-accounting information system.
By this information, this paper will study and evaluate the governmental accounting system
in Ministry of Municipalities and Tourism in Kurdistan Region, this ministry especially
controls the revenue, and generally control the general expenses by using a database built by
different software applications (such as Ingres, Oracle, PHP, SQL e.tc.).
2. Problem Statement:
53
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
This system is for integrating the information for municipal offices, and also it is a software and
administrative system that uses the power of the computer to support and gather all the activity of
municipal offices and control the financial administration using the database.
Table 1 below will show the features and the benefits of E-Accounting Information System
Table 1 the benefits of E-Accounting IS
Feature Benefit
Including DBMS to
Reliability of accessing coordinate and accuracy
the information the information, and
enhance the reports.
Bring the data to the data
Avoid the extra process center avoiding the data
entry repeating.
Save time by the way that
the reports for the
Reduce time and costs
organization could be
enhanced.
5. Hypothesis:
54
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
I. Equipment and devices: to achieve the aims of the system, it is necessary to take the
advantages of high-efficiency and advanced devices that contribute to the success of these
systems.
II. Automated Software: information systems cannot achieve the aims of the system without the
software that contribute to providing the information that is suitable for software. The
software is a series of instructions that make the computer has the ability to translate and
process them, this software are written in a specific language.
III. Regulations and policies: any E-accounting system is derived from a manual system,
scientific approach, and some specific instructions. In the governmental system,
governmental accounting system based on instructions issued by financial management that
help to design the E-Systems, these E-Systems matching the legislation and financial
instructions. Governmental transactions depend on some specific statements, like payable
and receivable statements that considered as main statements under a government system.
The payable statement presents the statements that paying the governmental expenses that
determined in the state budget. While receivable statement represents a specific model that
collect the money according to the instructions and financial systems that related to revenue
collecting.
IV. Administrators and managing of information technology: for the success of governmental
accounting information system in governmental institutes, the management of information
technology should exist to run and maintain the software, also to develop the system and
update it in line with the user needs. In addition to training the users to use these systems.
V. Access controls: governmental database consists of financial and non-financial information,
this information are vulnerable to hacked and miss-use, like editing or deleting, these
procedures lead to damage to society and loss of citizens' rights, so the controls should be
taken to reduce the damages like hacking and miss-uses.
6. Population of Study:
The number of the municipal offices used in the ministry of Municipalities and Tourism were 48
offices. Out of which 21 offices have been chosen because these offices are officially using the
governmental accounting information system. The questionnaires distributed to the management
department, system user, and to one (1) of IT department workers. 67 questionnaires were distributed,
but only 67 were returned, and just 85 questionnaires were thoroughly analyzed. To complete the
questionnaire the use of a five (5) Likert Scale was applied to three (variables) each respectively.
7. Analysis and Results:
This chapter begins with the preparation the data analysis. Following this, the analytic
procedure used in the study is introduced and its assumptions are tested. Then, the main thrust
of the analysis which was carried out is presented. The analysis presented covers the total
sample.
55
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
- Department
Table 2 Gender
Frequency Percent Valid Percent Cumulative
Percent
Valid male 37 63.8 63.8 63.8
female 21 36.2 36.2 100.0
Table 2 above shows the gender of the respondent that (63.8%) of the respondent are male
and the rest of (100%) Which is (36.2%) are female.
Table 3 above shows the age of the respondent. We can see (13.8%) of respondents are
between (18-25) years old, (32.8%) of respondents are between (26-35) years old, (43.1%)
of respondents are between (36-45) years old, and (10.3%) of respondents are between (46-
60) years old.
Table 4 and above shows the education level of the respondent. We can see that (12.1%)
from the respondents have (Secondary school) holders, (29.3%) from the respondents have
(Diploma) degree holders, (53.4%) from the respondents have (Undergraduate) degree
holders, (5.2%) from the respondents have (Master's) degree holders.
56
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Table 5 Department
Table 5 above shows the Department of the respondent. We can see that (15.5%) from the
respondents are (Accountant Department), and (36.2%) from the respondents are (Budgeting
Department), and (48.3.2%) from the respondents are (Ownership Department).
.886 3
The reliability is =0.886
7.3 Correlations
Table 7 Correlations
V1 V2 V3
V1 Pearson Correlation 1 .906** .724**
Sig. (2-tailed) .000 .000
N 58 58 58
V2 Pearson Correlation .906** 1 .527**
Sig. (2-tailed) .000 .000
N 58 58 58
V3 Pearson Correlation .724** .527** 1
Sig. (2-tailed) .000 .000
N 58 58 58
Table 7 above, indicates to the correlation between the basic components to achieve the systems
aims and the quality of the E-accounting system, (Person correlation=0.677) it is a very strong
positive relationship, and statistically significant because its less than (5%). The correlation
between have the basic components to achieve the systems aims and the financial management
needs, (Person correlation=0. 724) it is a strong positive relationship, and statistically
significant because it is less than (5%). The correlation between the quality of the E-accounting
system and the financial management needs (Person correlation=0. 527) it is a positive
relationship, and statistically significant because it is less than (5%).
57
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
8. Conclusions:
9. Recommendations:
10. References:
- Celebi, N. (2010). Public high school teachers opinions on school administrators
supervision duty in Turkey. Cypriot Journal of Educational Sciences, 5(3), 212-231.
- Elliott, R. K. 1998. Who are we as a profession. Moreover, what must we become?
Journal of Accountancy (February): 81.85.
- Gogan, J., L. M. Applegate, and R. Nolan. 1995. KPMG Peat Marwick: The shadow
partner. Harvard Business School Teaching Note 5-196-066. (Dec. 1). Cambridge,
MA: Harvard Business School.
- Reardon, J., R. Hasty, and B. Coe. 1996. The effect of information technology on
productivity in retailing. Journal Of Retailing 72 (4).
- Shafer, S. M., and T. A. Byrd. 2000. A framework for measuring the efficiency of
organizational investments in Information technology using data envelopment
analysis. Omega 28: 125.141.
- Smith, S. 1997. The smart way to invest in computers. Journal of Accountancy
(May): 63.65.
58
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
- Wang, C. H., R. D. Gopal, and S. Zionts. 1997. Use of data envelopment analysis in
assessing information Technology impact on firm performance. Annals of Operations
Research 73: 191.213.
59
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
The Finite-difference time-domain is a numerical analysis technique used for
modeling computational electrodynamics (finding approximate solutions to the associated
system of differential equations). Finite- difference time
domain (FDTD) solves the electromagnetic wave equation in the time domain using finite-
difference approximations and is today one of the most popular technique for the solution of
electromagnetic problems [5].
1.1 PURPOSE OF STUDY
1. Performing tasks on remote computers for distributed jobs to take advantage of multi-
core workstations (FDTD, varFDTD solvers) to overcome the restriction size of
multiple cores in order to have an implementation with good efficiency
characteristics and low execution time.
2. To understand FDTD mathematically, as well as some basic FDTD algorithm,
because it seems to have a high and efficient parallelization.
3. To implement parallelizing in order to reduce memory use and improve the time for
execution . The 6 partial differential equations of the FDTD numerical algorithm
60
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Ey
Ex Hz
Ex
Ey
Ez Ez
Hy
Ez Ez
Hx
(i , j , k )
Ex Ey
Ex
Ey
Y
X
61
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
3. METHODOLOGY
Thus, a large number of memory and computational time will be consumed when big
dimension and complex structure object is considered, which is beyond the capability of
single computer [12]. The research computation of this study is based on FDTD and MPI,
using C and its correctness will be tested by comparing different results respectively [14].
3.1 PARALLEL PROGRAMMING
In simple terms its a type of computation that allows various calculations or execution of
tasks simultaneously[15]. Parallel program consists of multi-tasks running on multiple
processors waiting to be compiled or set of instructions executed by a processor [10]. Taking
current observations of weather and processing these data with computer models to forecast
the future state of weather [9]. Used to study wealth of ocean using multiprocessors having
large computational power with low power requirements. Parallel processing is used for
modeling of economy of a nation/world. High interaction between processors along with
Shared memory modules can communicate calculations to distribute them across as many
processors as you can get simulations to complete faster, improve accuracy, or simulate
bigger physical systems [1] [8].
2.2 PARALLEL PROGRAMMING TECHNIQUES GPU
They include MPI which is explained throughout these piece of paper, VALU vector
arithmetic logic unit, AVX advanced vector extensions, CUDA compute unified device arch,
PVM parallel virtual machines and NUMA non-uniform memory access. [11].
3.2.1 GPU
Used primarily for 3-D applications. It is a single-chip processor that creates lighting effects
and transforms objects every time a 3D scene is redrawn. These are mathematically-intensive
tasks, which otherwise, would put quite a strain on the CPU. Lifting this burden from the
CPU frees up Cycles that can be used for other tasks[11].
3.2.2 CUDA
CUDA is a parallel computing platform and programming model invented by NVIDIA [13].
It enables dramatic increases in computing performance by harnessing the power of the
graphics processing unit (GPU) [6].
3.2.3. PVM
Is a software package that permits heterogeneous collection of Unix and/or Windows
computers hooked together by a network to be used as a single large parallel computer. [7].
[10]
4. DISCUSSION OF RESULTS AND COMPARISONS
The study uses MPI to develop a widely used standard for writing message passing programs.
The interface establishes a practical, portable, efficient and flexible standard, specifies a
library in a language in-dependent form and provides a bind between C and FORTRAN. It
has gained wide acceptance in parallel computing ranging from Massively Parallel systems
to network of computers and workstations [1]. [2].
62
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1.50E-07
1.00E-07
5.00E-08
0.00E+00
0 100 200 300 400 500 600
-5.00E-08
-1.00E-07
-1.50E-07
Figure 2: the comparison results between execution single computer and multiple computers.
8.00E-08
6.00E-08
4.00E-08
2.00E-08
0.00E+00
-2.00E-08 0 100 200 300 400 500 600
-4.00E-08
-6.00E-08
-8.00E-08
Figure 3: the compilation and memory usage of single computer and multiple computers.
63
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
4.1 SUMMARY
The proposed system depends on progressively applying forward and differencing in time
for the conduction of execution and compilations, the is more effective for substantial
Courant numbers. This work presents another structure that allows less machine memory
storage, and more importantly CPU time, for instance in the computational area is much
smaller than the wavelength of the methods. Numerical simulation observations
demonstrates that the new technique is extremely proficient, and the results are exceptionally
well with FDTD method as explained more in the table.
5. RECOMMENDATIONS
The (FDTD) system for settling the full-wave Maxwell's comparisons has been as of late
stretched out to give exact and numerically steady operation for time steps surpassing each
other as far as possible. One such class of issues is the investigation of fast execution time
which interconnects the techniques that are frequently required for the exact determination
of a typical electromagnetic wave phenomena.
6. CONCLUSION
It has been observed that the parallel implementation of the proposed algorithm provides a
significant reduction in simulation time needed to update field components as well as the
communication time needed to perform the interprocessor communication, when partitioning
the computational domain over many processors, especially for small domains, the efficiency
of the parallelization will reach a limitation due to increase in the communication time
between the processors.
ACKNOWLEDGEMENT
All praises and thanks to Allah S.W.T who created man and thought him what he knew not.
It is by His grace that I have been able to attain this point in my life. I am indeed most grateful
to my parents Alhaji Abubakar Isah and Hajiya Fatima and my ever capable lovely
Habibateey Fatima Idris whose constant love, support and guidance have been my source of
strength all these years. I wish to express my profound gratitude to my supervisors Asst Prof.
Dr. Oyku Akaydin and Assoc. Prof. Dr. Mehmet Kuaf an erudite academics, for their time,
patience, advice and correction which have contributed vastly to the completion of this work.
I cannot forget to acknowledge the support I received from my beloved brothers and sisters;
who stood by me throughout the stormy years and gave me the courage that I very much
need to pursue my studies. Jazakallah and I love you all.
REERENCES
1. O. Ramadan, O. Akaydin, M. Salamah, and A.Y.Oztoprak, Parallel Implementation of
the Wave-Equation Finite-Difference Time-Domain Method Using the Message Passing
Interface, Lecture Notes on Computer Science (LNCS), Vol. 3280, 2004, pp. 810-818
2. K.S. Yee, Numerical solution of initial boundary value problems involving Maxwells
equations in isotropic media, IEEE Transaction on Antennas and Propagation, Vol. 14,
1966, pp. 302307
64
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
3. Mehmet Kusaf and Abdullah Y. Oztoprak : Multi split-step unconditionally stable finite
difference time domain methods August 2009
4. I. R. Capoglu, A. Taflove, V. Backman, "A Frequency-Domain Near-Field-to-Far-Field
Transform for Planar Layered Media", IEEE Transactions on Antennas and Propagation,
vol. AP-60, no. 4, pp. 1878-1885, April 2012.
5. M. Avinash Reddy, et al., Gain and Bandwidth Enhancement of a MSP Antenna Over
Multiple-layer Dielectric Substrate, International Journal of Advances in Computer,
Vol. 3, pp. 55-57, March 2014.
6. W. Yu, X. Yang , Y. Liu , R. Mittra, and A. Muto, Advanced FDTD Method:
Acceleration, Parallelization and Engineering Applications, Artech House, Norwood,
Mass, USA, 2011.
7. K. Yee, Numerical solution of initial boundary value problems involving Maxwells
equations in isotropic media, IEEE Transactions on Antennas and Propagation, vol. 14,
no. 5, pp. 302307, 1966.
8. A. Taflove and S. Hagness, Computational Electrodynamics the Finite-Difference Time
Domain Method, Artech House, Norwood, Mass, USA, 2005
9. L. Catarinucci, S. Guglielmi, R. Colella, L. Tarricone,Compact switched-beam antennas
enabling novel power-efficient wireless sensor networksIEEE Sensors Journal, 14 (9),
pp. 3252-3259, 2014
10. Fenghua,Z. & Zhizhang, C. (2001). Numerical Dispersion Analysis of the
Unconditionally Stable 3-D ADI-FDTD Method: IEEE Transactions on microwave
theory and technique, vol.49, no.5.
11. F.D. Hastings and others, "application of the perfectly matched layer (pml) absorbing
boundary-condition to elastic-wave propagation", The Journal of the Acoustical Society
of America, 100(5), 1996, pp. 3061-3069
12. Fu, W., & Tan, E. (2004). Development of split-step FDTD method with higher-order
spatial accuracy: IEEE Electronics letter, vol.40, no.20.
13. F.Zhang, Z Chen and J. ZhangTowards the development of a three dimensional
unconditionally stable finite difference time domain method, IEEE Trans. microwave
theory Tech, Vol 48, no 9, 2000.
14. Guilin, S. (2004). Development & Evaluation of Novel Finite-Difference Time-Domain
methods for solving Maxwells equations (PhD dissertation) Canada, Concordia
University, Montreal, Quebec, Canada.
14.1 Harari, E. Turkel Accurate finite difference methods for time-harmonic wave
propagation J. Comput. Phys., 119 (1995), pp. 252270.
15. Jaakko, S. & Theodoros, D. (2000). Reduction of Numerical Dispersion in FDTD method
through artificial Anisotropy: IEEE Transactions on microwave Theory and Techniques,
vol.48, no.4, April 2000.
65
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
E
ncryption Operation is the process of converting a original data called plaintext
into ciphertext using secret key, and can be convert back into the original data
with the same secret key. There are several kinds of data encryption schemes
which form the fundamental of security. [1]
Encryption Operation schemes are generally based on either block cipher or stream cipher.
Historically for providing confidentiality should be Encryption focus on symmetric
encryption. It is only in the last several decades that other considerations, such as Integrity,
Authentication and Digital Signature have been included in cryptology theory and it practice.
The security of the data basically depends on two laborer first one is Confidentiality and
second one is Authentication. Achieving confidentiality means the data is encrypting bulk
digital data used block cipher. Single round of encryption offers inadequate security but
multiple rounds offer increasing security but the side effect is time consumed not always, it
is dependent on the strength and security of encryption functions used .[2]
The proposed algorithm is different of another by used block length multiple of 32
bits as a homogenous block cipher (4-8-12-16 bytes) with multiple of 48 bits of key and 4
nonlinearity Maps(Map2, Map3,Map4 Map5) all of them processing in one round and new
subkey generation algorithm also been designed new function for generated permutation
66
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
array used as initial permutation and inverse initial permutation then reversible variable
permutation dependent on secret key value as well Wave function is a nonlinear function.
Cryptography is one of many aspects of security, It is science and art of writing.
Egyptian Hieroglyphs in an inscription is first used of cryptography in 1900 B.C. The
primary functions of cryptography are confidentiality, Privacy, Authentication, Integrity,
Non-repudiation and Key exchange.[3]
The three types of Cryptography algorithms are :
1- Secret Key Cryptography or symmetric encryption : Used a single key for both
encryption and decryption, Primarily used for confidentiality and privacy.
2- Public Key Cryptography or asymmetric encryption: Used two keys, one of them
for encryption and another for decryption, mostly used for key exchange, non-
repudiation and authentication .
3- Hash Function: Used a mathematical transformation to encrypt of information,
providing a digital fingerprint. mostly used for message integrity.
Secret key cryptography algorithms in general categorized as being either stream
cipher or block cipher algorithms will focus on this aspect in our proposal. Stream ciphers
operated on a one bit at a time and key is continuously changed, means the Encryption
Operation of each digit depends on the current state of the cipher engine, Stream cipher is
also call state cipher. Generally, single bit/bites are used as single digits to avoid concerns of
security . Error propagation is a problem of the Stream cipher as a bit corrupted in
transmission will result of corrupted set of bits at the receiving side.[4]
Block Cipher Encrypts/Decrypts one block from data at a time used the same key on
each block with fixed block/key length. Encryption key scheme is determines the order in
which Transportation, Substitution and other mathematical functions are applied on each
block. Block cipher algorithms used two operations are Confusion and Diffusion to encrypt
Plaintext Block into Ciphertext Block. The aim of confusion is to make the relationship
among the encryption key and the ciphertext as complex as possible. Ideally, every bit in the
key should influence in every bit of the Ciphertext Block. By contrast, Diffusion operation
propagates the influence of each bit in the Plaintext Block over several bites in the Ciphertext
Block, making the cipher few oversensitive to statistical attacks.[6]
The actuality that stream cipher data Encryption/Decryption single bit at a time means
that they are particularly well appropriate to real time hardware applications, like image ,
video and audio applications. Stream cipher algorithm is practical weaker and less efficient
than block cipher algorithm for software applications and it minimal frequently used in that
sphere. Block cipher algorithm is easier to implement in Software application because the
message encrypted in blocks length that software already uses. The Encryption key is
predominantly the same size as the block length. Hence block ciphers achieve higher
diffusion and error propagation than stream ciphers, although it is worth noting that the
algorithm determines the amount of diffusion.[4][5]
Block ciphers algorithms usually require large memory, because they perform on larger
data chunks and predominating have carry over from preceding blocks, whilst Stream ciphers
algorithms perform on only a fewest bits or byte at a time they have relatively less memory
requirements and therefore cheaper to implement in limited scenarios like firmware,
embedded devices and special hardware.[5]
Stream ciphers algorithms are more difficult to perform appropriate, and apt to
weaknesses based on usage, since the fundaments are similar to one time pad, the key stream
cipher has more stringent requirements.[4]
67
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
On the other hand, Block ciphers algorithms encrypt a whole block at a time and
moreover have feedback modes which are most recommended, they are over sensitive to
noise in transmission, means if you mess up one data part, all the remnant is maybe
unrecoverable. while stream ciphers algorithms bytes are individually encrypted with no
connection to other data chunks in most ciphers/modes, and typically have support for
interruptions on the line.[5]
Stream ciphers algorithms do not provide security authentication or integrity
protection, but some block ciphers algorithms can provide integrity protection and
confidentiality depending on mode.[4][5]
The reason for choosing Block ciphers in this proposed because more useful when the
data amount is pre known such as a data file, fields, or request protocols.
Algorithm:
INPUT : block of length 32 bits, key of length 48 bits.
OUTPUT: block of length 32 bits.
1. Compute 32 bits after initial permutation by balance function = P block Xor
balance constant block.
2. Compute addition operation on balance block and subkey1 to yield P sum block
(each 8 bits of balance block addition to a single 8 bits of subkey1).
3. Perform Map Function on P-sum block to convert each 8 bits to covalence bits.
4. Perform variable permutation on P-Map block based on bits location of key.
5. Perform Reversible Wave function on variable permutation block.
6. Shifting and Rotation operations for each 8 bits of wave block.
7. Compute Xor operation on each 8 bits of block with different 8 bits of subkey2.
7. Swap among each 8 bits of block to produce the C block of length 32 bits.
8. Next 32 bits.
68
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The main idea of a proposed block cipher algorithm is begin by input block of
plaintext and the output is block of ciphertext after executed in number of different steps.
The algorithm has a multiple of 32-bits block size and multiple of 48 bits key length.
It is a 7-step built based on non Feistel cipher algorithm. The blocks are constructed by
converting a characters into 32 bits by using ASCII and also entered key by converting a 6-
character into 48 bits by using ASCII for each character. The figure 2&3 illustrate encryption
and decryption steps structure.
69
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
47 31 22 38 29 1 10 45 41 36 16 12 37 28 17 2
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
9 15 32 3 39 19 6 18 7 14 26 8 24 40 34 33
70
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
71
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Another feature of the Wave Function is that never results in the same sequence
and the output will be repeated after 2n trial.
2.6. SR FUNCTION
A Shifting and Rotation function is propagation function for each byte of block. A
proposed block cipher used four shifting and rotation function (S&R1 means shifting each
byte by one and so on for S&R2 , S&R3 and S&R4).
2.7. XF FUNCTION
XF function is xor operation between input block and subkey2, The input of the XF
function is a block of length 32 bits Xor-ed with a block of Subkey2 of the same length
generated by permutation and selection operation for secret key. In the end the output will
72
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
swap among each 8 bits and saving the ciphertext block in the binary file as shown in the
main structure. Figure 6 illustrate XF function structure or single 8 bits
3. EVALUATION
There are two types of block cipher Feistel and Non-Feistel cipher, a feistel cipher
algorithm is a block cipher construction as a symmetric build. This came on the label of a
German inventor Horst Feistel. A Wide proportion of block ciphers use the Feistel network,
such as the (DES) Data Encryption Standard, Blowfish, KASUMI, Simon and etc. The
advantage of the Feistel Network is very similar for the encryption & decryption operations
it is identical in some cases and requiring only moving from up to down ,From top to bottom
or a reversal of the key schedule. Feistel ciphers and similar algorithms are product ciphers,
and repeated operations for number of rounds.[5]
A non Feistel cipher is the sound type of block cipher so a Non-Feistel block cipher
algorithm is a chain of linked mathematical operations performed in block cipher, it is
network with a block of Plaintext and Key as inputs and applies several alternating
operations to produce the ciphertext block such as AES , Square, 3-Way, SHARK , SAFER
, PRESENT, and , Kuznyechik .
Although the Feistel block cipher that used S-box (like Data Encryption Standard) is fully
similar to Non-Feistel block cipher, but there are some differences that make either Feistel
or Non-Feistel more applicable in assured situations. For a given amount of Diffusion and
Confusion, an Non-Feistel block cipher has extra inherent parallelism[11], and so given a
CPU with a more number of execution units can be computed faster than a Feistel block
cipher.[12] CPUs with less execution units such as most smart cards cannot take advantage
of this inherent parallelism. Also Non-Feistel ciphers require s-box to be invertible (to
perform decryption). Feistel inner functions have no such restriction and can be constructed
as one way functions.
The advantage of a proposed algorithm is that, since its external and internal properties
are change from function to function, it may be extremely difficult to find any kind of
characteristic that propagates well through all of the different kinds of functions that appear
73
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
in the cipher. However, implementing of a proposed algorithm and analyzing it is often much
more complicated. Hardware implementations are generally cheaper, and software
implementations smaller and easier to correctly code.
A proposed block cipher algorithm used a balance function, These structure provide
efficient implementations for mutable of the 32 bits of plaintext block by initial permutation,
and used xor-ed operation with fixed balance binary number for solving problem when all
plaintext block (0) or (1).
A Map function is substitutes a byte (the input of map function) by another byte ( Map
Function output). This Substitution should be one byte to one byte, to ensure inevitability for
decryption of a proposed algorithm. The good Function goal is changing one input bit will
change about half of the output bits.
The Wave Function is a reversible nonlinear function which helps to increase the
confusion of the resulting output besides, it helps to increase the diffusion because whenever
a zero is located in a sequence the rest of the sequence will be converted. Another feature is
that never results in the same sequence and the output will be repeated after 2n trial.
Addition operation with subkey1, Variable permutation dependent on key locations
values, Shifting and Rotation operations of byte plaintext block, Xor-ed with subkey2 and
Bytes Swapping operation are helps for increasing alteration among each byte.
Diffusion is important concept in the design of robust of block cipher algorithm, It is
operation between plaintext block and ciphertext block means if changed one bit of plaintext
block then several bits of ciphertext block should be changed and Vice versa. In another
interpretation, This means the frequency statistics of bit in the plaintext block are diffused
over several bits in the ciphertext block and statistical attack need more meaningful to do a
ciphertext block. Table 5,6 shown the range of diffusion between plaintext block and
ciphertext block in the block cipher algorithm proposed.
74
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Plain 00000000000000000000000000111111 26 6
Cipher 10110100101001001011101000111011 15 17 13
Table 6: shown the range of diffusion with same of block size .
4. CONCLUSION
A proposed block cipher algorithm designed to create a strong algorithm that runs in
a reasonable time on presently available hardware, that is rationally easy to implement,
etc. As such, a proposed algorithm design may allow us to design faster and better block
cipher algorithm than we could if we limited ourselves to number of round or Non-Feistel
network structures.
1- We concluded the relationship between the blocks length and hardware , It can
perform multiple of 32 bits as block length as a homogenous algorithm to reduce the
time of execution
2- A number of rounds should be less to speed increasing.
3- Multiple of 48 bits as a secret key should be entered automatically and it dependent
on application field such as password , data, image, audio, video, satellite
communication its.
4- Permutation operation should be after each map function to propagate bits in each
block and increase confusion and diffusion operations.
5. REFERENCES
References must be listed in the order they were cited (numerical order). The references
must not be in alphabetical order eg:
1- Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: A lightweight block
cipher for multiple platforms. In Selected Areas in Cryptography - SAC 2012. LNCS,
vol. 7707, pp. 339-354. Springer, Heidelberg (2013).
2- Wu, W., Zhang, L.: Lblock: A lightweight block cipher. In Applied Cryptography
and Network Security - ACNS 2011. LNCS vol. 6715, pp. 327-344. Springer,
Heidelberg (2011).
3- van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography
and Security. Springer. ISBN 978-1-4419-5905-8., p. 455.
4- Junod, Pascal & Canteaut, Anne (2011). Advanced Linear Cryptanalysis of Block
and Stream Ciphers. IOS Press. p. 2. ISBN 9781607508441.
5- Chakraborty, D. & Rodriguez-Henriquez F. (2014). "Block Cipher Modes of
Operation from a Hardware Implementation Perspective". In Ko, etin
K. Cryptographic Engineering. Springer. p. 321. ISBN 9780387718163.
6- Lars R. Knudsen and John Erik Mathiassen, On the Role of Key Schedules in Attacks
on Iterated Ciphers, ESORICS 2014, pp322334
7- Dr.Abdulkareem O. Ibadi, Special Security e-Mail System , Ph.D. dissertation,
University of Technology , June 2007
8- Ben Morris, Phillip Rogaway, Till Stegers. "How to Encipher Messages on a Small
Domain". CRYPTO 2010.
75
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
9- Menezes, Alfred J., Oorschot, Paul C. van; Vanstone, Scott A. (2011). Handbook of
Applied Cryptography (Fifth ed.). p. 251.
10- Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives",
free online lectures on Chapter 3 of "Understanding Cryptography, A Textbook for
Students and Practitioners". Springer, 2012.
11- "Principles and Performance of Cryptographic Algorithms" by Bart Preneel, Vincent
Rijmen, and Antoon Bosselaers.
12- "The Skein Hash Function Family" 2010 by Niels Ferguson, Stefan Lucks, Bruce
Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
page 40.
13- Sinha, S., Arya, C. (2012). Algebraic Construction and Cryptographic Properties of
Rijndael Substitution Box. Defence Science Journal, 62(1).
14- Paar, C., Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and
Practitioners. New York City, New York: Springer Publishing.
15- Grocholewska-Czurylo, A. (2011). Cryptographic properties of modified AES-like
S-boxes.
16- Annales UMCS Informatica, AI XI(2), 37-48. DOI: 10.2478/v10065-011-0009-4.
17- Easttom, C. (2015). Modern Cryptography. New York City, New York: McGraw
Hill.
76
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
F orthousands of years cryptography and encryption have been used for secure
communication. Cryptography is the science and the study of secret writing
techniques [1].
Asymmetric encryption also known as public-key encryption is one form of
cryptosystem in which different keys are used to perform encryption and decryption one is a
public key and the other is a private key. Public Key encryption can be used for
authentication, confidentiality, or both [2].
The major advantage of using the public key encryption is that they avoid the need of
sharing any shared key between the transmitter and the receiver via a secure channel. In a
shared key encryption scheme the transmission of a private key via a secure channel can
cause a completely danger to the encryption scheme [3].
77
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Chaos theory is a field of mathematics. It is the study of complex, nonlinear and dynamic
systems. This field was pioneered by Lorenz in1963. [4]. Nonlinear equation is deterministic
that can generates random or chaotic behavior over time [5]. Dynamic system is very
sensitive to initial condition and its response known as a Butterfly Effect, in which small
change in initial state has led to unpredictable change in the final state [6]. The chaotic
behavior has been widely studied and many generators have already been used to generate
sequences of pseudo random numbers [7].
2. RELATED WORK
Many researchers uses chaotic map in public key encryption. In [8] a public-key encryption
algorithm based on iteration of one-dimensional Chebyshev chaotic maps and two-
dimensional of torus automorphisms chaotic map was proposed. This encryption schemes
are both secure and practical, and can be used also for digital signature.
In [9] a new cryptosystem by using iterations of an expansion chaotic map was proposed.
The expansion map is modified logistic map. The proposed cryptosystem is a symmetric-key
cryptography has characteristic of public-key cryptography, that uses three kinds of keys, a
public key, a private key and a common private key.
In [10] an expansion of the public key encryption based on chebyshev polynomials with
a modest hash function was proposed. This model can be applied on multilevel inputs types
such as images and videos.
78
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
79
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The final result is converted to binary number. Then, a normalization process is made to
that binary number. This process is described in Algorithm (6). The first loop is used to set
the parameter s which is a large integer that represents the private key. The second loop is
used to set the parameter r, while the third loop is used to set random x which it is between
0 and 1. In key generation step shown in Algorithm (7), the s and x parameters are used with
a Rotation equation to compute the public key. The r, x and s parameters are used with a first
order Chebyshev map and another with a Rotation equation to encrypt and decrypt message.
The encryption algorithm is shown in Algorithm (8).
In decryption steps shown in Algorithm (9) the same chaotic maps with the same initial
values are used to generate the random values. Those values are converted to binary using
Algorithm (5) and an inverse Fraction_code is used in decryption process to convert the result
to ASSCII form as shown in Algorithm (10).
Algorithm (4): Fraction_code
Input: integer values between 1 and 256;
Output: Fraction _code as array of ranges between 0 and 1;
Begin
For i=0 to 255
Represent the value of i as a real value in range [i, i+1) with three fraction digits;
Put the result of above step in Fract_array[i];
End For
Fraction_code = Fract_array;
End.
Algorithm (5): Convert The Result of 3-D Chaotic Map to Binary Using Threshold Value.
Input: Result of 3-D chaotic R.
Output: Binary-digits.
Begin
For j=1 to number of R
If Rj >= 0.5 Then
Binary-digits= Binary-digits & 1
Else
Binary-digits= Binary-digits & 0
End If
End For
End.
Algorithm (6): Normalization of Binary Values.
Input: Real Value R.
Output: Normalized Binary Value BN.
Begin
B= Convert R to binary;
If B contains exponent part and fraction part Then
BN=merge the fraction with the exponent after eliminate '.'
Else If B in exponential (Floating point) format Then
BN= B* 10^number of digit after exponential part
Else
BN=B
End If
End.
80
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Apply
Convert Result to Take the last
Chebyshev map
decimal (D) result of
D times
Chebyshev
Normalization
If B contains exponent then
Convert to eliminate Dot Else If B in floating
binary (B) point format then multiply it by 10
^ the number of digit after
exponent part
81
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
End For
Compute Rotation Equation (RRs(x));
Public key=(x,RRs);
Privet key=s;
End.
Algorithm (8): Public Key Encryption
Input: Message M, Initial values of Rotation and Chebyshev.
Output: Cipher.
Begin
M= select a message and convert it to ranges between [0,1] using Fraction-code Algorithm;
Compute Lr(x) by using Chebcheve map shown in Equetion (1);
Compute RRrs(x) using Rotation Equation shown in Equation (4);
X=M.RRrs(x);
Cipher= (Lr(x),X);
End For
End.
Algorithm (9): Public Key Decryption.
Input: Cipher.
Output: Palin.
Begin
Compute Rotation Equation RR(sr);
M= X/ RR(sr);
Plain= Inverse Fraction_Code;
End.
Algorithm (10): Inverse Fraction_code
Input: Fraction _code as array of ranges between 0 and 1;
Output: integer values between 1 and 256;
Begin
For i=0 to 255
Take the real value and find the equivalent integer value in Fraction_code array;
Put the rult of above step in Inverse Fract_array[i];
End For
Inverse Fraction_code =Inverse Fract_array;
End.
5. EXPERIMENTAL RESULTS
In this section the proposed algorithm is tested. Those tests includes testing the key generated
from the proposed algorithm. The five basic statistical tests and NIST tests are used to
examine the randomness of the generated key
The basic tests are used to determine whether the sequence possess specific characteristics
of truly random numbers. However, if the sequence passes all tests there is no guarantee that
it was produced by a random bit generator [16].The generated keys from the proposed
algorithm are examined using those tests. The results show that the generated bit streams
have the characteristics of truly random numbers as shown in Table (1). In this table, the
different length of keys are statistically tested and pass most of tests.
82
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
83
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
6. CONCLUSIONS
From the presented study it has been concluded that, using hybrid chaotic maps in public key
encryption instead of one map strengths the system and makes it more robust against the
attackers. Also, the results of hybrid maps have the characteristics of truly random numbers
because they pass most of statistical and NIST test which makes it difficult for the intruder
to crack the original data.
References
[1] Nicholas G. McDonald, "Past, Present, and Future Methods of Cryptography and Data
Encryption", A Research Review, 2010.
[2] William Stallings, "Cryptography and Network Security Principles and Practice", Fifth Edition,
Prentice Hall, 2011.
[3] Adel A., Amr H. , Hany H., "Survey Report on Chaos Based Public-key Cryptosystem" ,
International Journal of Emerging Technology and Advanced (ISSN 2250-2459, ISO 9001:2008
Certified Journal, Volume 3, Issue 12, December 2013).
[4] David Levy, "Chaos Theory and Strategy: Theory, Application. And Managerial Implications",
Massachusetts Strategic Management Journal, Vol. 15, 167-178, U.S.A (1994).
[5] L. Douglas Kiel, Euel W. Elliott, "Chaos Theory in the Social Sciences: Foundations and
Applications", The University of Michigan Press, 1996.
[6] tienne Ghys, "The Butterfly Effect", 12th International Congress on Mathematical Education,
2012.
[7] Kharel, Rupak, "Design and Implementation of Secure Chaotic Communication Systems",
Doctoral thesis, Northumbria University, 2011.
[8] Ljupco Kocarev, Marjan Sterjev, Attila Fekete, Gabor Vattay, "Public-key encryption with
chaos", American Institute of Physics, Vol. 14, No. 4, 1078-1082, 2004.
[9] Shuichi Aono, Yoshifumi Nishio, "A Cryptosystem Based on Iterations of Chaotic Map", IEICE
Technical Report, Vol.107, No.87, 2007.
[10] K. Prasadh, K. Ramar, R. Gnana jeyaraman, "Public key cryptosystems based on chaotic
Chebyshev polynomials", Journal of Engineering and Technology Research, Vol.1 (7), 122-128,
2009.
[11] Pawan N. Khade, and Manish Narnaware, "3D Chaotic Functions for Image Encryption",
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, 2012 ISSN 1694-
0814.
[12] Skiadas, "Mathematical models of Chaos. In Chaos Applications in Telecommunications",
Stavroulakis, P., Ed.; CRC Press: Boca Raton, FL, USA, 2006; pp. 383413.
[13] Skiadas, " In Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and
Forms", CRC Press: Boca Raton, FL, USA, 2008.
[14] Daniel-Ioan Curiac and Constantin Volosencu, "Path Planning Algorithm based on Arnold
Cat Map for Surveillance UAVs", Defence Science Journal, Vol. 65, No. 6, November 2015, pp.
483-488, DOI : 10.14429/dsj.65.8483 ,2015, DESIDOC
[15] Tang, W.K. & Liu, Y., "Formation of High-Dimensional Chaotic Maps and Their Uses in
Cryptography. Chaos Based Cryptography", Springer Berlin Heidelberg, 2011, pp. 99-136.
84
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
[16] Mohammed Saleh, "Proposed Block Cipher Algorithm with Cloud Computing Based on Key
Generation", M.Sc. Thesis, University of Technology, 2013.
[17] Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer, "Enhancing Security and
Speed of RC4". International Journal of Computing and Network Technology ISSN 2210-1519
Int. J. Com. Net. Teach. 3, No. 2 (May 2015).
85
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Dr.Abdulkareem O. Ibadi
Department Computer Engineering, Baghdad College for Economic Sciences University - Iraq
dr.ibadi@yahoo.com
1. INTRODUCTION
E
ncryption Operation is the process of converting a original data called plaintext
into ciphertext using secret key, and can be convert back into the original data
with the same secret key. There are several kinds of data encryption schemes
which form the fundamental of security. [1]
Encryption Operation schemes are generally based on either block cipher or stream cipher.
Historically for providing confidentiality should be Encryption focus on symmetric
encryption. It is only in the last several decades that other considerations, such as Integrity,
Authentication and Digital Signature have been included in cryptology theory and it practice.
The security of the data basically depends on two laborer first one is Confidentiality and
second one is Authentication. Achieving confidentiality means the data is encrypting bulk
digital data used block cipher. Single round of encryption offers inadequate security but
multiple rounds offer increasing security but the side effect is time consumed not always, it
is dependent on the strength and security of encryption functions used .[2]
86
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
87
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
diffusion and error propagation than stream ciphers, although it is worth noting that the
algorithm determines the amount of diffusion.[4][5]
Block ciphers algorithms usually require large memory, because they perform on larger
data chunks and predominating have carry over from preceding blocks, whilst Stream ciphers
algorithms perform on only a fewest bits or byte at a time they have relatively less memory
requirements and therefore cheaper to implement in limited scenarios like firmware,
embedded devices and special hardware.[5]
Stream ciphers algorithms are more difficult to perform appropriate, and apt to
weaknesses based on usage, since the fundaments are similar to one time pad, the key stream
cipher has more stringent requirements.[4]
On the other hand, Block ciphers algorithms encrypt a whole block at a time and
moreover have feedback modes which are most recommended, they are over sensitive to
noise in transmission, means if you mess up one data part, all the remnant is maybe
unrecoverable. while stream ciphers algorithms bytes are individually encrypted with no
connection to other data chunks in most ciphers/modes, and typically have support for
interruptions on the line.[5]
Stream ciphers algorithms do not provide security authentication or integrity
protection, but some block ciphers algorithms can provide integrity protection and
confidentiality depending on mode.[4][5]
The reason for choosing Block ciphers in this proposed because more useful when the
data amount is pre known such as a data file, fields, or request protocols.
Algorithm:
INPUT : block of length 32 bits, key of length 48 bits.
OUTPUT: block of length 32 bits.
8. Compute 32 bits after initial permutation by balance function = P block Xor
balance constant block.
9. Compute addition operation on balance block and subkey1 to yield P sum block
(each 8 bits of balance block addition to a single 8 bits of subkey1).
10. Perform Map Function on P-sum block to convert each 8 bits to covalence bits.
11. Perform variable permutation on P-Map block based on bits location of key.
12. Perform Reversible Wave function on variable permutation block.
13. Shifting and Rotation operations for each 8 bits of wave block.
14. Compute Xor operation on each 8 bits of block with different 8 bits of subkey2.
7. Swap among each 8 bits of block to produce the C block of length 32 bits.
8. Next 32 bits.
88
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The main idea of a proposed block cipher algorithm is begin by input block of
plaintext and the output is block of ciphertext after executed in number of different steps.
The algorithm has a multiple of 32-bits block size and multiple of 48 bits key length.
It is a 7-step built based on non Feistel cipher algorithm. The blocks are constructed by
converting a characters into 32 bits by using ASCII and also entered key by converting a 6-
character into 48 bits by using ASCII for each character. The figure 2&3 illustrate encryption
and decryption steps structure.
89
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
4 11 24 13 9 16 3 17 8 14 2 20 19 0 26 15
16 17 18 19 2021 22 23 24 25 26 27 28 29 30 31
10 7 18 27 1223 6 25 31 28 1 21 30 5 29 22
Table 1 : Initial Permutation IP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
13 26 10 6 0 29 22 17 8 4 16 1 20 3 9 15
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
5 7 18 12 11 27 31 21 2 23 14 19 25 30 28 24
Table 2 : Inverse Initial Permutation IP-1
2.1.1 PERMUTATION GENERATION ALGORITHM
Input : list of number schedule arranged from 0 to n-1
Output: array of random numbers between 0 to n-1 without repetition
1. Loop from 0 to n-1 .
2. Using predefined random function in vb.net (Random) working storage area.
3.Using list operation to move location of random number generated to the output array
4. Remove the location and reduce list length by one .
5. Next.
90
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
47 31 22 38 29 1 10 45 41 36 16 12 37 28 17 2
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
9 15 32 3 39 19 6 18 7 14 26 8 24 40 34 33
Table 3 : Permutation and Selection of Subkey1
91
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Another feature of the Wave Function is that never results in the same sequence
and the output will be repeated after 2n trial.
92
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
2.6. SR FUNCTION
A Shifting and Rotation function is propagation function for each byte of block. A
proposed block cipher used four shifting and rotation function (S&R1 means shifting each
byte by one and so on for S&R2 , S&R3 and S&R4).
2.7. XF FUNCTION
XF function is xor operation between input block and subkey2, The input of the XF
function is a block of length 32 bits Xor-ed with a block of Subkey2 of the same length
generated by permutation and selection operation for secret key. In the end the output will
swap among each 8 bits and saving the ciphertext block in the binary file as shown in the
main structure. Figure 6 illustrate XF function structure or single 8 bits
3. EVALUATION
There are two types of block cipher Feistel and Non-Feistel cipher, a feistel cipher
algorithm is a block cipher construction as a symmetric build. This came on the label of a
German inventor Horst Feistel. A Wide proportion of block ciphers use the Feistel network,
such as the (DES) Data Encryption Standard, Blowfish, KASUMI, Simon and etc. The
advantage of the Feistel Network is very similar for the encryption & decryption operations
it is identical in some cases and requiring only moving from up to down ,From top to bottom
or a reversal of the key schedule. Feistel ciphers and similar algorithms are product ciphers,
and repeated operations for number of rounds.[5]
A non Feistel cipher is the sound type of block cipher so a Non-Feistel block cipher
algorithm is a chain of linked mathematical operations performed in block cipher, it is
network with a block of Plaintext and Key as inputs and applies several alternating
operations to produce the ciphertext block such as AES , Square, 3-Way, SHARK , SAFER
, PRESENT, and , Kuznyechik .
Although the Feistel block cipher that used S-box (like Data Encryption Standard) is fully
similar to Non-Feistel block cipher, but there are some differences that make either Feistel
or Non-Feistel more applicable in assured situations. For a given amount of Diffusion and
93
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Confusion, an Non-Feistel block cipher has extra inherent parallelism[11], and so given a
CPU with a more number of execution units can be computed faster than a Feistel block
cipher.[12] CPUs with less execution units such as most smart cards cannot take advantage
of this inherent parallelism. Also Non-Feistel ciphers require s-box to be invertible (to
perform decryption). Feistel inner functions have no such restriction and can be constructed
as one way functions.
The advantage of a proposed algorithm is that, since its external and internal properties
are change from function to function, it may be extremely difficult to find any kind of
characteristic that propagates well through all of the different kinds of functions that appear
in the cipher. However, implementing of a proposed algorithm and analyzing it is often much
more complicated. Hardware implementations are generally cheaper, and software
implementations smaller and easier to correctly code.
A proposed block cipher algorithm used a balance function, These structure provide
efficient implementations for mutable of the 32 bits of plaintext block by initial permutation,
and used xor-ed operation with fixed balance binary number for solving problem when all
plaintext block (0) or (1).
A Map function is substitutes a byte (the input of map function) by another byte ( Map
Function output). This Substitution should be one byte to one byte, to ensure inevitability for
decryption of a proposed algorithm. The good Function goal is changing one input bit will
change about half of the output bits.
The Wave Function is a reversible nonlinear function which helps to increase the
confusion of the resulting output besides, it helps to increase the diffusion because whenever
a zero is located in a sequence the rest of the sequence will be converted. Another feature is
that never results in the same sequence and the output will be repeated after 2n trial.
Addition operation with subkey1, Variable permutation dependent on key locations
values, Shifting and Rotation operations of byte plaintext block, Xor-ed with subkey2 and
Bytes Swapping operation are helps for increasing alteration among each byte.
Diffusion is important concept in the design of robust of block cipher algorithm, It is
operation between plaintext block and ciphertext block means if changed one bit of plaintext
block then several bits of ciphertext block should be changed and Vice versa. In another
interpretation, This means the frequency statistics of bit in the plaintext block are diffused
over several bits in the ciphertext block and statistical attack need more meaningful to do a
ciphertext block. Table 5,6 shown the range of diffusion between plaintext block and
ciphertext block in the block cipher algorithm proposed.
94
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
4. CONCLUSION
A proposed block cipher algorithm designed to create a strong algorithm that runs in
a reasonable time on presently available hardware, that is rationally easy to implement,
etc. As such, a proposed algorithm design may allow us to design faster and better block
cipher algorithm than we could if we limited ourselves to number of round or Non-Feistel
network structures.
5- We concluded the relationship between the blocks length and hardware , It can
perform multiple of 32 bits as block length as a homogenous algorithm to reduce the
time of execution
6- A number of rounds should be less to speed increasing.
7- Multiple of 48 bits as a secret key should be entered automatically and it dependent
on application field such as password , data, image, audio, video, satellite
communication its.
8- Permutation operation should be after each map function to propagate bits in each
block and increase confusion and diffusion operations.
5. REFERENCES
References must be listed in the order they were cited (numerical order). The references
must not be in alphabetical order eg:
18- Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: A lightweight block
cipher for multiple platforms. In Selected Areas in Cryptography - SAC 2012. LNCS,
vol. 7707, pp. 339-354. Springer, Heidelberg (2013).
95
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
19- Wu, W., Zhang, L.: Lblock: A lightweight block cipher. In Applied Cryptography
and Network Security - ACNS 2011. LNCS vol. 6715, pp. 327-344. Springer,
Heidelberg (2011).
20- van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography
and Security. Springer. ISBN 978-1-4419-5905-8., p. 455.
21- Junod, Pascal & Canteaut, Anne (2011). Advanced Linear Cryptanalysis of Block
and Stream Ciphers. IOS Press. p. 2. ISBN 9781607508441.
22- Chakraborty, D. & Rodriguez-Henriquez F. (2014). "Block Cipher Modes of
Operation from a Hardware Implementation Perspective". In Ko, etin
K. Cryptographic Engineering. Springer. p. 321. ISBN 9780387718163.
23- Lars R. Knudsen and John Erik Mathiassen, On the Role of Key Schedules in Attacks
on Iterated Ciphers, ESORICS 2014, pp322334
24- Dr.Abdulkareem O. Ibadi, Special Security e-Mail System , Ph.D. dissertation,
University of Technology , June 2007
25- Ben Morris, Phillip Rogaway, Till Stegers. "How to Encipher Messages on a Small
Domain". CRYPTO 2010.
26- Menezes, Alfred J., Oorschot, Paul C. van; Vanstone, Scott A. (2011). Handbook of
Applied Cryptography (Fifth ed.). p. 251.
27- Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives",
free online lectures on Chapter 3 of "Understanding Cryptography, A Textbook for
Students and Practitioners". Springer, 2012.
28- "Principles and Performance of Cryptographic Algorithms" by Bart Preneel, Vincent
Rijmen, and Antoon Bosselaers.
29- "The Skein Hash Function Family" 2010 by Niels Ferguson, Stefan Lucks, Bruce
Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
page 40.
30- Sinha, S., Arya, C. (2012). Algebraic Construction and Cryptographic Properties of
Rijndael Substitution Box. Defence Science Journal, 62(1).
31- Paar, C., Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and
Practitioners. New York City, New York: Springer Publishing.
32- Grocholewska-Czurylo, A. (2011). Cryptographic properties of modified AES-like
S-boxes.
33- Annales UMCS Informatica, AI XI(2), 37-48. DOI: 10.2478/v10065-011-0009-4.
34- Easttom, C. (2015). Modern Cryptography. New York City, New York: McGraw
Hill.
96
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
T
he evaluation of clustering [1][3] results is an unavoidable process [4][7]
which is used to quantify the performance of clustering algorithms. The quality
evaluation of a clustering result is an active area of research and many criteria
are being developed regularly. Unfortunately, the evaluation of a clustering
result always contains some elements of subjectivity and the criteria do not always give
satisfactory evaluation [8]. For this reason, it is impossible to define a universal criterion to
evaluate the results produced by all the existing criteria. However, a number of criteria exist
and are repeatedly used by many researchers to compare clustering results [9], [10]. Since
there are a large number of possible clustering results for the same dataset, the objective is
97
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
to assess whether any of these results is better than another. So to correctly evaluate and
validate the results, it can be necessary to use multiple evaluation criteria like in [11].
In this paper, the generalities of the evaluation criteria are provided, and then focus is on
the unsupervised ones.
This following of this paper is organized as: the second section will describe evaluation
criteria types, then followed by unsupervised evaluation criteria in the third section, and
fourth section will give the conclusions.
98
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Class 1 members
Class 2 members
Class 2
NC
SSE I R d x g (Ci )
2
(1)
i 1 xci
Weszka and Rosenfeld [14] proposed such a criterion with thresholding that measures
the effect of noise to evaluate some thresholded images. Based on the same idea of within-
class uniformity, Levine and Nazif [15] also defined a criterion that calculates the uniformity
of a class as follows:
2
1 NC xCi gl x xCi gl x
LEV1 I R 1 (2)
maxxCi gl x minxCi gl x
2
N i 1
where
I R is the partitioning result of the image I into NC classes C C1,..., CNC ,
N is the number of pixels of the image I,
gl x is the gray level of pixel x in the image I.
A standardized uniformity measure was proposed by Sezgin and Sankur [16] that is based
on the Cochran homogeneity measurement [17]. However, this method requires a threshold
that is often arbitrarily selected, thus limiting the usage of this criterion. Another criterion to
measure the within-class uniformity was developed by Pal and Pal [18]. It is based on a
thresholding that maximizes the local entropy of the classes in a partitioning result. In the
case of slightly textured images, these criteria of within-class uniformity prove to be effective
and very simple to use. However, the presence of textures in an image often generates
improper results due to the over-influence of small regions.
Complementary to the within-class uniformity, Levine and Nazif [15] defined a disparity
measure between two classes to evaluate the dissimilarity of different classes in a partitioning
result. The formula of total between-class disparity is defined as follows:
99
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
LEV 2 I R
NC
w
k 1 Ck
NC
j 1/ C j W Ck
Ck \C j gl Ck gl C j / ( gl Ck gl C j
p
(3)
k 1wRk
NC
where wck is a weight associated to Ck that can be dependent of its area, gl Ck is the average
of the gray level of Ck and pCk \C j is the length of the boundary of the class Ck common to
the perimeter of the class C j . This type of criterion has the advantage of penalizing over-
segmentation.
Zeboudj [19] proposed a measure based on the combined principles of maximum
between-class (external) disparity and minimal within (interior) class disparity measured at
the pixels neighborhood.
gl x gl z
Let c x, z be the disparity between two pixels x and z x and z Ci , and
L 1
L be the maximum gray level.
The interior disparity CI Ci of the class Ci is defined as follows:
max c x, z , z V , z C
1
CI Ci s i (4)
NCi xCi
where NCi is the number of pixels in class Ci and Vs is the neighborhood of the pixel x.
The external disparity CE Ci of the class Ci is defined as follows:
max c x, z , z V , z C
1
CE Ci s i (5)
pi xCi
100
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
This criterion has the disadvantage of not correctly taking into account strongly textured
regions.
Another criterion that is based on the combination of the within-class and between-class
disparities is the Davies-Bouldin index [20]. It estimates the within-class disparity based on
the distance from the points in a class to its centroid and the between-class disparity based
on the distance between centroids. It is defined as:
NCi NC j
1 NC
1
NCi d
k 1
Fk , g Ci NC d Fk , g C j
1
j
k 1
DB I R max
(8)
NC i 1 j , j i d g Ci , g C j
d2 x j d1 x j
Sil ( x j )
max d2 x j , d1 x j
(9)
Basing on the definition of Sil ( x j ) , the silhouette of the class Ci is defined as:
Sil ( x )
1
Sil (Ci ) j (10)
NCi x j Ci
This criterion is very efficient but its time complexity makes it inapplicable to large
datasets.
101
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The Dunns index (Du) [22] is another unsupervised criterion that measures the
compactness of a class and the separateness between classes as follows:
Du I R
min
i 1:NC min d g(C ), g(C )
j 1:NC ,i i
ij i j
(12)
max dii ( g (Ci ), g (Ci )
i 1:NC
where dij g (Ci ), g (C j ) is the distance between the center of classes Ci and C j , which is
defined here as the minimum distance between the objects of different classes (see Equation
(13)). dii ( g (Ci ), g (Ci )) is the maximum distance between two objects in the same class (see
Equation (14)).
This evaluation criterion has two disadvantages: firstly, it is very time consuming and
secondly it is highly affected by the presence of noise in the dataset.
In [23], [24] Rosenberger and Chehdi presented a criterion that enables estimating the
within-class homogeneity and the between-class disparity considering the types of regions
(textured or non-textured)1 in the partitioning result. This criterion quantifies the quality of a
partitioning result as follows:
1 D IR D IR
ROS I R (15)
2
The global within-class disparity D I R quantifies the homogeneity of each class
obtained in the partitioning result IR of image I. On the other hand, the global between-class
disparity D I R quantifies how well the classes obtained are separated from each other.
The global within-class disparity D I R reflects the statistical stability of each class. It is
calculated from the within-class disparity D Ci of the different classes in a partitioned
image:
1 NC NCi
D IR D Ci
NC i 1 N
(16)
The weight of the within-class disparity of a class Ci in the global within-class disparity
is proportional to the number of pixels for this class. The same principle is used to calculate
the between-class disparity D I R of the partitioned image I R that measures the disparity
of each class with the other classes:
1 For further reading about region type in an image please refer to [25].
102
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1 NC NCi
D IR D Ci
NC i 1 N
(17)
This criterion is calculated using the between-class disparity D Ci and the with-in class
disparity D Ci of each class Ci . The calculation of these two criteria is detailed in the
following:
Within-class disparity criterion
This criterion evaluates the homogeneity of a class, i.e. the variation of the statistics in the
interior of this class. In the calculation of the within-class disparity, the nature of the regions
(i.e. textured and non-textured) is taken into account.
In the non-textured case, this criterion for class Ci is defined as:
2
1 1
D Ci gl x
2
g x (18)
NCi2 xCi
l
NCi xCi
This criterion is sufficient to characterize the within-class disparity of a non-textured
region. However, in the textured case, each class is characterized by a set of texture feature
vectors. The dispersion of this set of vectors allows calculating the within-class disparity in
the textured case.
Between-class disparity criterion
The evaluation process of between-class disparity of a class is similar to the with-in class
disparity, but instead of estimating the homogeneity of a class, it is disparity with the other
classes is calculated. The between-class disparity is also calculated according to the nature
of the regions as follows:
Between classes of the same region type:
o The disparity between two classes belonging to uniform regions D Ci , C j is
defined as:
gl Ci gl C j
D Ci , C j (19)
NG
where NG is the number of the gray levels in the image
o The disparity between two classes belonging to textured regions D Ci , C j is
defined as:
D Ci , C j
d g ci , g c j (20)
g ci g c j
where d(.,.) is the Euclidean distance, g(Ci) is the centroid of class Ci , and . denotes the
Euclidean norm.
Between classes of different region types: the disparity between classes of different
region types is set as the maximum value, i.e. 1.
Error! Reference source not found. gives a summery of the previously cited methods in
his section.
103
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
4. EXPERIMENTAL RESULTS
The evaluation criteria described in the previous section are tested on an image database
containing 100 images. These images are clustered by the well-known k-
means, and fuzzy C-means [26] algorithms. As these algorithms are unstable
algorithm, the algorithms are run 100 times on the same image and then the
result that has the best objective function value of that algorithm is selected. In
this database the images are composed of five regions (extracted from the
Brodatz album [27]). The number of classes k is set to 5, as the images contain
5 regions for both algorithms, and the fuzzification factor m is set to 4 to get
more stable results [28].
Figure 2 shows two examples of one synthetic image of this database. The
unsupervised evaluations are compared to Overall Correct Classification Rate
(OCCR), which compares the clustering results with the ground truth (GT) of the
image that is calculated as below:
No.of pixelsclassifiedcorrectly
OCCR = (21)
TotalNo.of Pixels
According to the results, the Rosenberger and Chehdi index is the best index that in the
88% of the cases the index scores high values and high OCCR. The Silhouette index is the
second best index with a score of 79%. Davies-Bouldin and Dunn gave 74% and 72%
respectively. The remaining Zeboudj and the 2 indices of Levine and Nazif gave scores below
45%.
104
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
(a) (b)
5. CONCLUSION
The evaluation of clustering results is inevitable to assess the quality of the results
obtained.
In this paper, various unsupervised evaluation criteria used to assess the quality of a
clustering result is presented. These criteria are also called internal criteria because they do
not use any external information in the evaluation process. Each of these criteria are effective
in specific cases, for example in image datasets, some are effective the case of non-textured
or slightly textured images, while others give effective results in the case of textured images.
None of the evaluation methods can prove satisfactory in all the cases. Therefore, to correctly
evaluate the algorithms and their results; more than one evaluation technique should be used
and their results should be combined.
6. ACKNOWLEDGEMENT
Many thanks goes to the team of TSI2M in the engineering school of ENSSAT in names
(Prof. Dr. Kacem Chedi and Asst. Dr. Claude Cariou), Rennes 1 University, France, as this
paper is a part of my work in corporation with them.
7. REFERENCES
[1] R. Xu and I. Wunsch, D., Survey of clustering algorithms, IEEE Trans. Neural Netw.,
vol. 16, no. 3, pp. 645678, 2005.
[2] C. C. Aggarwal and C. K. Reddy, Data Clustering: Algorithms and Applications. CRC
Press, 2013.
[3] A. K. Jain, M. N. Murty, and P. J. Flynn, Data Clustering: A Review, ACM Comput
Surv, vol. 31, no. 3, pp. 264323, Sep. 1999.
[4] A. Biswas and B. Biswas, Defining quality metrics for graph clustering evaluation,
Expert Syst. Appl., vol. 71, pp. 117, Apr. 2017.
[5] F. Zaidi, D. Archambault, and G. Melanon, Evaluating the Quality of Clustering
Algorithms Using Cluster Path Lengths, in Advances in Data Mining. Applications and
Theoretical Aspects, 2010, pp. 4256.
105
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
106
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
[26] V. K. Dehariya, S. K. Shrivastava, and R. C. Jain, Clustering of Image Data Set Using
K-Means and Fuzzy K-Means Algorithms, presented at the International Conference
on Computational Intelligence and Communication Networks (CICN), 2010, pp. 386
391.
[27] P. Brodatz, Textures: A Photographic Album for Artists and Designers. Dover
Publications, Incorporated, 1999.
[28] A. Taher, Approche cooprative et non supervise de partitionnement dimages
hyperspectrales pour laide la dcision. Rennes 1, 2014.
107
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
S
ensor nodes are spatially deployed in the region of interest in order to monitor
the physical or environmental phenomena like temperature, humidity, light,
pollution, pressure and sound. They collect the sensed data from the monitored
environment, manipulate the data locally, and transmit them to the sink for
further analysis. These sensor nodes work in a collaborative manner and constitute a Wireless
Sensor Network (WSN) [1, 2, 3, 18, 19]. In sensor node, the radio unit represents the
principal source of energy consumption. Therefore, it is important to remove redundant
108
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
sensed data before reporting them to the sink to save the energy and improve the lifetime of
sensor node [4].
Data collection approaches determine the way of sensors work in data collection and
sending to the base station. There are two models for data collection in WSNs: time driven
and event-driven [5, 20]. This work considers time-driven data collection which is named
Periodic Sensor Networks (PSNs). In PSN, every sensor node transmits the sensed data of
the monitored area to the sink periodically. Several PSNs applications use the periodic way
to monitor certain conditions regularly such as pressure, humidity, temperature, etc. Two
main challenges in PSN. First, PSN has to provide adequate lifetime in order to satisfy
applications needs. Second, data management is more difficult due to the huge amount of
collected data by this network. In PSN, the change in the monitored environment can slow
down or speed up. The energy consumption can be decreased when the sensor node modifies
its sampling rate based on the dynamic modification of the monitored phenomena. Therefore,
to prolong the network lifetime, adaptive sampling for periodic data collection is required
for energy optimization and data reduction [6].
109
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Initially, the base station activates a set of sensors to get the sensed data of monitored
environment. The correlation percentage is computed for the received sensed data to increase
or decrease the activated sensors. Chatterja and Havinga [10] present a sampling algorithm
based temporal correlation among sensed data. In this algorithm, the sampling rate is
modified depending on the stability of the monitored environment. The sampling rate
increases when the environment conditions are unstable, otherwise the rate decreases.
Masoum et al. [11] introduce an energy-saving mechanism for data collection. Their scheme
exploits spatio-temporal correlation among sensors and their sensed data to determine the
candidate sensors which are responsible for sampling and transmission. The selected sensors
are adaptively changed.
In recent years, Laiymani and Makhoul [12] proposed a scheme for adaptive sampling
using ANOVA model and Fisher test in PSNs. This algorithm works at the sensor node to
adapt its sampling rate. The authors in [13] proposed method to remove the repetition of
collected data in PSN called Prefix Frequency Filtering (PFF).
This paper suggests an Adaptive DAta Collection (ADaC) protocol for PSNs. The major
goal of ADaC is to remove redundant sensor readings, save energy, and improve the network
lifetime. ADaC performs two main phases. First, data collection according to adaptive
sampling rate. Second, ADaC allows to each sensor node to adapt its sampling rate for each
cycle (cycle = 2 periods) based on the Eculidean similarity. ADaC is simulated on the
OMNeT++ network simulator using real data of sensor nodes. The comparison results show
that our protocol can provide a better performance and prolong the network lifetime.
110
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Start
Update
Residual
Energy
111
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
node n catches one temperature reading Si each time slot. At the end of each period,
the temperature readings series of sensor n is formed such that S =
{s1 , s2 , . , s1 , s }, where is the total number of temperature readings captured
during the period. The sensor node collects the temperature readings at sampling rate
(SMPR ) speed. The SMPR is initiated to temperature readings per period. The
redundant temperature readings captured by the sensor node increase in two states:
short time slot and slowly variation of a monitored area of interest.
112
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
periods. The aim of computing the similarity between the temperature readings series
every cycle is to adapt the rate of sampling based on the new calculated similarity.
Therefore, the Euclidean distance is employed to discover the similarity percentage,
PSim among several periods per cycle. On one hand, if PSim is high, it means the
monitored condition is changed at a slow speed. Therefore, the sensor node will
decrease its rate of sampling to the minimum value to prevent collecting redundant
readings. On the other hand, if PSim is low, the sensor node will collect temperature
readings at approximately maximum sampling rate so as to prevent losing significant
readings. Therefore, to adapt the rate of sampling of sensor node in accordance with
the computed similarity among periods, the reverse of similarity percentage for
Euclidean coefficient (RPSim) is computed as follows
Consequently, the process of adapting the sampling rate in the sensor node depends
on the RPSim, thus the application criticality will be taken into consideration in this
process. In ADaC protocol, the criticality of application is expressed as a minimum
amount of sampling rate in a period for a sensor node, MINSMP. MINSMP takes values
in the range 0 to 100 which represent the criticality level either low or high
respectively. The sensor node adapts the new sampling rate to the MINSMP (not to the
RPSim) when the recently calculated sampling rate is less than MINSMP. Depending on
the requirements of the application and before the deployment, all the sensor nodes
initialize their MINSMP. It is also possible to change MINSMP dynamically during the
lifetime of the network for the whole sensors or for just a given subgroup of sensors
if there are some types of management and control schemes are available. Algorithm
2 illustrates an adaptive sampling rate approach.
113
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
14:
15:
16:
17: SMPR
4. Protocol evaluation
The evaluation of ADaC protocol is given in more details in this section. The main
objective of this protocol is to enable each sensor to modify its sampling rate adaptively in
accordance with the dynamic changing of the monitored environment. Consequently,
ADaC protocol will remove redundant sensor readings, save energy, and improve the
network lifetime.
114
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The radio expends energy as described in [17], where is the energy consumed for
radio electronics and it is equal to 50 nJ/bit, is the energy consumed by the amplifier
and it is equal to 100 pJ/bit/2 .
The energy consumption required for capturing mbits by the sensor node is calculated
as follow
(, ) = (, ) 7 (5)
These experiment simulations consider the length of data reading m equal to 64 (we
choose this length because almost the papers (e.g. [6], [13] and [17]) use this length). In the
case of transmission, 64 bits are added to m bits message which corresponds to the
frequency of data reading m. Consequently, Energy consumption is defined as the total
energy dissipated at each sensor node during the collection and transmission of data
readings and formulated as follow
= (, ) + (, ) (6)
(a) (b)
Figure 2. Sampling rate adaptation (A) = 50 AND (B) = 100.
In this experiment, MINSMP uses two values: 20 for low risk level disaster and 60 for
high risk level disaster. As shown in Figure 2, the adaptation of sampling rate is dynamic
and after each cycle based on the application criticality level (i.e., MINSMP = 20 or 60). The
results in Figure 2 (a) and (b) validate the good performance of our protocol.
115
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
station at the end of simulation for ADaC protocol compared with the results of the method
without using adaptive sampling technique.
The results illustrate that ADaC protocol at each sensor node decreases from 26% to
69% of the Percentage of sent readings to the base station as comparing to 99% without
using adaptive sampling. Therefore, ADaC protocol removes the redundant collected
readings successfully and the percentage of sent readings to the base station is reduced. We
can also see that the volume of sent readings from the sensor node to the base station
decreases when increases or MINSMP decreases. This is due to the percentage of sent
readings rely on the number of collected readings and the risk level of application.
100
90
80
70
60
50
40
30
20
10
0
20 50 100 200
Number of Readings/ Period
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
20 50 100 200
Number of Readings/ Period
Figure 4. Energy consumption at each sensor node.
116
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
As shown in Figure 4, ADaC protocol saves energy because it reduces both collected
and sent readings at the sensor node. The consumed energy of a sensor node using ADaC
protocol is minimized from 26% to 68% as compared with the results of the method without
using adaptive sampling technique. It can be observed that ADaC protocol is effective in
terms of reducing energy consumption for the applications with high and low risk level,
where more energy is saved when MINSMP decreases.
6. References
[1] I.F. Akyildiz, and M.C. Vuran, Wireless sensor networks, Vol. 4. John Wiley & Sons,
2010.
[2] M. Abdelaal, O. Theel, C. Kuka, P. Zhang, Y. Gao, V. Bashlovkina, D. Nicklas, and M.
Frnzle, Improving energy efficiency in QoS-constrained wireless sensor
networks, International Journal of Distributed Sensor Networks, 2016.
[3] A.K. Idrees, K. Deschinkel, M. Salomon, and R. Couturier, Distributed lifetime
coverage optimization protocol in wireless sensor networks, The Journal of
Supercomputing, vol. 71, no.12, pp.4578-4593, 2015.
[4] X. Tang and J. Xu, Adaptive data collection strategies for lifetime constrained wireless
sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 6,
pp. 721734, 2008.
[5] G. Campobello, A. Segreto, and S. Serrano, Data gathering techniques for wireless
sensor networks: A comparison, International Journal of Distributed Sensor Networks,
vol. 2016, 2016.
[6] A. Makhoul, H. Harb, and D. Laiymani, Residual energy-based adaptive data collection
approach for periodic sensor networks, Ad Hoc Networks, vol. 35, pp. 149160, 2015.
[7] C. Liu, K. Wu, and M. Tsao, Energy efficient information collection with the arima
model in wireless sensor networks, in Global Telecommunications Conference, 2005.
GLOBECOM'05. IEEE, vol. 5, pp. 5pp., 2005.
117
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
118
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
ABSTRACT
ARTICLE INFO
During last ten years, it is noticed an increasing number of
Article History: accidents causing losing of large number of victims This
Received: 17 March 2017 paper related to an explosion alarm system to inform the
emergency center to make fast response for saving and
Accepted: 1 April 2017
rescuing life of people. The whole system is controlled by
Published: 10 April 2017 arduino uno microcontroller unit which senesces the
Keywords: SMS, environment and gives reaction based on what it sensed. Also
Arduino, GSM, GPS, GPS (global Position System) is used that gives the latitude
Sound sensor, Alarm and longitude of the event and sends this information as a
short message to GSM (Global System for Mobile
Communication) mobile using SMS (Short Message Service)
. In other side, database of location (latitude, longitude) of
each help center place is saved to be used for determining the
nearest center to the accident through shortest path formula.
Finally the path between emergency center and accident
location is tracked through Google map application.
1. INTRODUCTION
W
ith the advancement of human civilization, its safety has a prime concern.
Alarm system is one of the most important means of assistance. It alarms the
concern persons that an undesired accident is happened. Automatic alarm
systems are utilized for decreasing the likelihood of danger occurring. Automatic alarms
system operate by using an intelligent devices to detect the accident quickly and to get a
shortest time between the moment of the problem occurs and the moment of help responding
in order to reduce the substantial losses in a short period of time. The alarm system will give
a way to intervene quickly and effectively control on the problem and thus reducing the
amount of the losses.
Researches had implemented alarm systems, for example alarm system for earthquake [1] ,
unwanted events in home [2] and fire detection [3].
This paper focuses on design and implementation of alarm system. The paper is structured
as follows: section 2 represents the proposed system as block diagram and flowchart.
119
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
2. PROPOSED SYSTEM
Figure (1) illustrates the block diagram of the system. It consists of two parts: The
transmitting part and emergency monitoring part. The mechanism work of the system is
started at the transmitting part. The sensor vibrates to indicate an explosion is occurred. GPS
retrieves the location information of the event from satellites in the form of latitude and
longitude to the microcontroller. GSM sends the location and other information in the form
of SMS from microcontroller to the emergency monitoring unit. SMS is a GSM mobile
technology that can perform remote communication wherever they are. Through this facility
messages can be sent quickly, accurately and at a low cost. All the modules of transmitted
unit are controlled by arduino open source microcontroller.
The emergency monitoring unit received the alarm message by any android phone. This
developing system is based on android phone to get much more mobility and user friendly
.Android application give a many service to reduce the complexity in receiving and sending
gathered information (alarm message). The gathered information is sent and stored on web
server (cloud) utilities from android application. Cloud computing is an Internet-based
computing, Wi-Fi Internet services used to get the information from android mobile to cloud
and from cloud to PC. SMS gateway enables the application to send/receive SMS messages
to mobile devices with the computer. Gateway is most fast and reliable way for SMS sending
and receiving. Now all the transmitted information arrives in computer to be subjected to
analysis and then a formula is run to find the nearest helping center to the explosion place.
120
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
This is performed by a database of all the helping centers3 in Province by stored the location
of each helping center in form of (latitude, longitude) and the phone number for each one.
Also all the alarm messages is stored in database for future reviewing. The transmitted
information is send as SMS to the nearest helping center. Finally the path is tracked
graphically using Google map application; figure (2) illustrates the shortest path on Google
Map.
3. FLOWCHART OF SYSTEM
Figure (3) shows the flow chart of the system. It gives the basic idea about how the system
works. First of the initialization of the system is carried out in which it checks if the system
in normal state (no accident) and it is properly or not. If the system is not in normal state then
an explosion detect. Then it tracks position of event through GPS and send SMS through
GSM module to the emergency center. In the emergency center checks the shortest path
between explosion position and helping center position.
3
The helping centers is any places that can present help
Such as the police center, hospital, etc.
121
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
4. HARDWARE REQUIREMENT
The proposed system contains the following hardware components that participate in
performing the task of alarm system.
4.1 ARDUINO
Arduino is an open source physical computing platform based on small microcontroller
board with simple input/output board. Arduino is composed of two major parts: the arduino
board, which is the piece of hardware and the arduino IDE, which is the piece of software. It
is multiplatform environment that may run on Windows, Macintosh, and Linux. Arduino is
a flexible technique; it can communicate with the computer with an easy way also it is a
powerful way to build better prototypes [4].The proposed system used arduino uno.
122
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
speed, and travel direction [5] . Although receiver can calculate the position, the accuracy of
positioning is dependent on the number of satellites in view, signal qualities, weather
conditions, etc. It can be used in a many applications including navigation, tracking systems,
mapping and robotics. All these information are provided by GPS in any time and in any
weather condition [6]. The proposed system is used GPS modem to determine the (latitude,
longitude) of the vehicle.
5. SOFTWARE REQUIREMENTS
5.1 Arduino software
In the transmitted part the system used (Arduino c language) to perform the connection of
the board with PC using serial port such as COM1 or COM2. The ATmega328 on the arduino
uno comes with a boot loader that allows you to upload new code to it without the use of an
external hardware programmer. It communicates using the STK500 protocol [10]
6. RESULT
A figure (4) illustrates the detailed message and its content, the first word (alarm) is a
keyword to differ between alarm message and other messages, the second word is (danger)
means there is an explosion occur , the (3322.872) is latitude , and (4422.759) is longitude
of the event . The proposed system deals with the critical situation, so we should be take into
consideration the time span between the moment of detection and the moment of intervene.
The maximum time need to transmit the message from GSM to android mobile is 11.5 second
and the minimum time is 6 second, the maximum time need to transmit the message from
android mobile to PC is 11 second and the minimum time is 5.5 second.
123
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
7. CONCLUSION
Our prime objective in this system is to reduce the numerous losses in human life beside
of the economic loss , this system can detect the problem that occur by using sensors that
integrated with a microcontroller , GSM and GPS modules . SMS is used to alert user via
mobile phone when possible problem occurs. The message sent to center emergency that
decided the nearest helping center to the vehicle, also it view the shortest path on the Google
map application.
8. RECOMMENDATIONS
The system can be further developed with added hardware like camera in transmitted
part to describe the situation online and send it as a video to emergency monitoring part.
9. REFERENCES
[1] Hima MS, Josphin Subha, Kalyani Devi G, Karthika Sankaran, Naveen S, "Earthquake
Indicator Using Arduino," International Journal of Research in Advent Technology, Vol.4,
No., vol. 4, no. 8, 2016.
124
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
[2] A. Gupta, "Intelligent Home security using GSM communication module," Vols. 13 No. 1
Jan. 2015, pp. 239-242, no. 1, pp. 239-242, 2015.
[3] Omar Asif , Md. Belayat Hossain , Mamun Hasan , Mir Toufikur Rahman, Muhammad E. H.
Chowdhury, "Fire-Detectors Review and Design of an Automated, Quick Responsive Fire-
Alarm System Based on SMS," Int. J. Communications, Network and System Sciences, 2014,
7, 386-395, vol. 7, pp. 386-395, 2014,.
[5] AHMET IRKIN and SERKAN KARAKIS, Relative distance measurement using GPS and
internal vehicle sensors, CHALMERS UNIVERSITY OF TECHNOLOGY, 2011.
[6] Basavaraj Chougula, Archana Naik , Monika Monu, Priya Patil and, "Smart girls security
system," International Journal of Application or Innovation in Engineering and Management
, vol. 3, pp. 1-4, 2014.
[7] P. Chandra, Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security, 1d ed.,
Elsevier,, 2005.
[8] Ramchandra K. Gurav and Rohit Jagtap, "Wireless digital notice board using GSM
technology," " International Research Journal of Engineering and Technology (IRJET) , vol.
2 , pp. 1-3, 2015..
[9] Jiankai.li, Sound sensor user manual, seeed Grow the di_erence, 2015.
[10] Santoso Budijono ,Je_ri Andrianto and Muhammad Axis Novradin Noor, "Design and
implementation of modular home security system with short messaging system," 2014.
125
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
126
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
I
n 1997, the National Institute of Standard and Technology (NIST) unit of the US
commerce department announced an open competition, and invited the cryptography
and the data security specialists from around the world to participate in the conference
to select a replacement for the old standard cipher algorithm (DES) and Triple-DES, because,
during the last years DES has become obsolete for its too short key and block sizes,
notwithstanding the current advances in computing technology [1]. The new encryption
standard should support block lengths of 128-bits and key lengths of 128-bit, 192-bit and
256-bits. This demand determined by the NIST. In this conference applied twenty-one
candidates algorithms, the specification of these algorithms varies widely in structure and
form and their coverage of implementation some of these candidate using formal
mathematical style and other depending on combinations text diagrams and pseudo code.
The first round of conferences held in California in 1998 and fifteen algorithms have been
submitted. The initial evolution criteria determined by three elementary categories security,
cost and algorithm and implementation characteristics. The large majority of the candidates
algorithms satisfy the criteria determined by the NIST [2]. In March 1999 the second AES
conference was held in Rome, Italy submitted the final evolution criteria that include general
security, ease of implementation on both software and hardware, implementation attacks and
flexibility in encryption and decryption, ciphering key and other factors. Later fifteen
algorithms were reduced to five algorithms [3].
There were several algorithms that were not accepted because either they did not satisfy the
security requirements presented by NIST or because the weakness such as LOKI97, DAL,
HPC and another some candidates algorithms had not been eliminated because of the security
problems but for other reasons such as cost, slow and bad performance for example Cast-
256, Crypton, DFC, E2 and SAFER+. Only five algorithms were accepted in this conference
that were considered as the optimal algorithms and have a good specification with margin of
security these algorithms include (MARS, RC6, Rijndael, Serpent, and Towfish) [4]. The
origin of each candidate algorithm with submitters and countries can be shown in the
following Table 1.
TABLE 1: The First of the AES Candidates Algorithms
127
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The selection process was in accordance with a hundred points that were distributed
according to seven criteria and these criteria gave the algorithms variations in access to capture
points in these seven criteria [5]. As it shown in Table 2.
TABLE 2: The Main Criteria for the Selection of AES Cipher
128
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
One of the five finalist block cipher chosen as AES, IBM s' algorithm uses innovative
techniques including multiplication data-dependent rotation. One of the components of the
cipher is 9*32-bits of S-box. MARS is a 128 bit-block cipher and a variable key size ranging
from 128-bit to 444-bit. As most symmetric-key block ciphers MARS is based on a Feistel
network structure and a round function. This function provides the basis for the encryption
mechanism and combines several linear and non-linear operations [8]. MARS operates on
32-bits microprocessor and run slowly. MARS designed to be more secure than tripleDES
and to be used in computers today but it has been observed that it is more complicated overall
the AES candidates. The main strength of MARS is its robustness. This was the main design
goal but MARS contains more fail stop mechanisms than any of the other finalists. Due to
the heterogeneous structure and the large variety of strong operations in MARS. Because
the fail-stop mechanisms in MARS makes its hardware implementation more involved than
the other finalists [9].
Serpent cipher Created by R.Anderson and E.Biham, two of the leading experts in
cryptanalysis, which can be viewed as an indication to its strength. It is one of the AES
candidates and it has been implemented on 8-bit, 16-bit, and 32-bit platform like other AES
submissions. Serpent is a (SPN) that uses 32-rounds. The algorithm has two different modes
of implementation: standard and bitslice mode. The standard mode operates on individual
bits or groups of four bits, while the bitslice mode improves software efficiency by operating
on entire 32-bit words [10]. Serpent has a block size of 128-bits and support a key size 128-
bits, 192-bits, and 256-bits. The main operations on a block are implemented by four word
(32-bits). The S-box of Serpent appears to have a high security margin. Serpent uses the set
129
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
of different S-boxes with four bits inputs and four bits outputs. In each round there is used
one of S-box working in parallel 32 times. After the first eight rounds, all S-boxes are used
and this unit of eight rounds is repeated four times. The main selling point of Serpent is its
very conservative number of rounds. Serpent does not have fail-stop mechanisms as in
MARS [11].
3.3. ADVANCE ENCRYPTION STANDARD (TWOFISH CIPHER)
Symmetric key block cipher proposed by Counterpane. The Twofish block cipher
employs a 16-round feistel network with additional whitening of the input and output. The
128-bit plaintext block is split into four 32-bit words. In the input whitening step each 32-bit
word is XORed with a different 32-bit input whitening key. Towfish work with 128-block
size and accept a variable length key up to 256-bit sufficient on a various platforms, with
objective function work on 32-bits word with four key dependent 8*8 S-box followed by
4*4 maximum distance separable matrix over GF(28) a pseudo hadamard transform and key
addition [12]. Twofish cipher was designed for flexibility, and indeed it offers a wide variety
of implementation tradeoffs. It is also a very fast cipher. However, the same design for
flexibility also resulted in a cipher which is very hard to analyze. The designers used many
tricks to obtain flexibility which security implications are not clear. Towfish has the
efficiency and speed on both software and hardware implementable on a wide variety of
platform and applications and suitable for stream cipher, hash function, and MAC [13].
3.4. ADVANCE ENCRYPTION STANDARD (RC6 CIPHER)
RC6 is very simple algorithm and the easiest of the AES candidates to implement
developed by Ron Rivest in collaboration with associates from RSA laboratories. It is based
on carefully crafted ciphers such as RC2, RC4, and RC5 exactly it is strengthened version of
RC5 which was proposed in 1995. The RC6 cipher works with 20-rounds feistel structure
with objective function work on 32-bit modular multiplication, addition, and XOR with
addition key [14]. The main advantage of RC6 is its simplicity and speed which may serve
as an indication of the suitability of the current design as well. The main argument against
RC6 is single point of failure for the design method. There are also lingering concerns
regarding the number of rounds used in RC6. The main difference between the RC6 and its
predecessor RC5 is the RC6 algorithm depends mainly on the usage of four working registers
each with size of 32-bits, this means it handles 128-bits input/output blocks in contrast to the
RC5 cipher which works in two registers of 64-bits [15].
3.5. ADVANCE ENCRYPTION STANDARD (RIJNDAEL CIPHER)
The Rijndael cipher is the winner algorithm in the NIST competition designed by Joan
Daemen and Vincent Rijmen from Belgium and recently selected as the official (AES). It is
well suited for work across all platforms and involve clean mathematical structure and seem
as a unique among the candidates ciphers. It is an iterated block cipher that has a very simple
structure and easily implemented in both hardware and software. Rijndael operates with
block size 128-bits and with variable key length of 128-bits, 192-bits and 256-bits. It is a fast
and flexible cipher. Rijndael is somewhat similar to SQUARE cipher and the lessons from
SQUARE are incorporated in its design [16].
130
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
After deep study and an intensive analysis of the internal structure and the algebraic
foundation of the AES cipher, there is evidence that the AES algorithm has many suspicious
aspects and it has suffered from several vulnerabilities from the design term that brings the
attention and can be listed as follows:
1- Most of the developing methods of the previous studies for most researchers and
specialists deal with the AES improvement and exactly focus on increasing the
number of rounds or increasing the block size in order to increase the security level
and this clue does not consider the best solution for the development experiments.
2- Most of the AES algorithms (MARS, Serpent, RC6, Twofish, and Rijndael) designed
to work with platforms of 32-bits and could not work with 64-bit and this is
considered a negative factor in some operating system of 64-bit from the designing
perspective as it was mentioned in the personal blog of Bruce Schneier.
3- The three keys of changeable length (128-bit, 192-bit, and 256-bit) of the AES cipher
have not real length except the first one with a length of (128-bit) and the two others
are unreal as it claimed in the most references. Since the XORing operation between
the key and state matrix is not fit to the same size or in another word it only increased
the probability of the search space for the key generation to the rest rounds.
4- The R-Con table with fixed values calculated according to specific formula can be
considered as an awkward point in the designing map for the key F-function
especially for the key generation that should depend on a complicated one-way
technique or intractable methods.
5- The decryption process with AES structure is slower than the encryption process
especially in the embedded devices and this feature refers to the unbalancing structure
in encryption and decryption process for some devices.
6- The encryption process for thousands of bits will give an obvious difference time
between the encryption and decryption process due to the accumulator for repetition
of thousand rounds, so the difference will be a clearly evident.
7- The AES cipher work with 128-bit of plaintext or 16-byte and all internal operations
rely on the byte-oriented implementation that means the maximum value can be
implemented in Hexa-decimal is (FF).
FF (byte) * FF (byte) mod M= (FF) Byte
So the multiplying byte by byte also will give byte as a final result.
8- The selection only one algorithm (Rijndael) and discarding the other four best
algorithms (MARS, RC6, Twofish, and Serpent) according to the essay that was
mentioned in NIST report (do not put all eggs in the one basket) is an unsatisfactory
reason. Since there is a possibility to combine all the candidates algorithms in one
package of software and give more options and flexibility for selecting an appropriate
algorithm according to the application nature.
9- Several modern attacks have proven their effectiveness from a theoretical perspective
like the algebraic attacks, implementation attack and side channel attacks.
10- The AES ciphers life time is dedicated for ten years to face the advance of
technology progress at that time. So many researchers think that finding an alternative
131
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
model becomes a vital issue according to the requirements of the last decade. So the
current state may need more options from all aspects
11- AES cipher with secure of 128-bit may not be appropriate for the big data applications
and others modern big applications like secure cloud storage. Therefore; these
applications with huge data may need a larger algorithm with a larger order of
mathematical and structure foundations with tradeoff speed.
12- The Rijndael cipher got the higher voting in the NIST competition but this does not
means it is the best from all factors since some algorithms exceed the Rijndael from
certain aspects but the accumulated scores were from the Rijndael share.
13- The X-time function designed to work with (02) recursive multiplications clue for a
number of times according to the coefficient values instead of the tradition
mathematical multiplication operations that have taken modular on the irreducible
polynomial equation of degree eight.
14- The last round without mixcolumn has no effective role in the security factor as it
was mentioned by the authors of the Rijndael. So it can be added or discarded.
15- The fixed S-Box with two tables of 256-values in hexa-notation may form a good
objective for the cryptanalysts attacks, since each value has a mapping to the
corresponding value with inverse picture.
5. RECOMMENDATIONS
After this contrastive study, there are several important recommendations for
future work that can be summarized here:
1. Design a dynamic algorithm with the changeable stage for all linear and non-
linear layers.
2. Develop a new model with a higher mathematical order of finite field or
Galois Field (GF) and with higher irreducible polynomial to increase the
security level and the complexity.
3. Improve the AES cipher to work with the system of 64-bits and eliminate any
numerical constants that can be exploited by the attackers.
4. Made the improved algorithm more balanced in encryption and decryption
process with embedded devices and restricted hardware devices.
5. Develop new techniques for the key generation that generated key with real
length specifically for the long keys that comprises 192-bit, 256-bit and upper
than that increase the guessing probabilities effectively.
6. CONCLUSIONS
The current research presented a simple literature review and an analytical study for
the AES selection and the main standard criteria for the design principles. The basic
target of this study is to highlight weaknesses and vulnerabilities in addition to explain
the gaps of the design elements that possible to be exploited in the AES structure. This
paper discussed the Rijndael features on the one hand constructions fails stop and what
are the best alternatives by given a set of fundamental factors diagnostic for the negative
aspects from the point of view author and the scientific researchers articles around the
world. The introduced research also includes some future recommendations for the
132
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
designers and academic specialists in addition to the essence solutions for developing a
modern algorithm.
7. REFERENCES
[1] A. M. Sagheer, S. S. Al-Rawi, and O. A. Dawood, Proposing of Developed Advanced
in Encryption Standard AES, IEEE Computer Society DOI 10.1109/DESE, Page No.
197, 2011, The Fourth International Conference in Developments in E System
Engineering DESE, Dubai, 2011.
[2] J. Daemen and V. Rijmen, "The design of Rijndael: AES the advanced encryption
standard", Springer-Verlag, 2002.
[3] Dr B. Gladman, "Implementation Experience with AES Candidate Algorithms", Second
AES Conference, 28th February 1999.
[4] B. Gladman and Worcester, "The Need for Multiple AES Winners", United Kingdom,
7th April 1999.
[5] J. Dray, Report on the NIST Java AES Candidate Algorithm
Analysis,http://csrc.nist.gov/encryption/aes/round1/r1-java.pdf, November 8, 1999.
[6] O. A. Dawood, A. S. Rahma and A. J. Abdul Hossen, The Euphrates Cipher, IJCSI
International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, ISSN
(Print): 1694-0814 | ISSN (Online): 1694-0784.
[7] Federal Information Processing Standards Publication 197 "Announcing the
ADVANCED ENCRYPTION STANDARD (AES)", November 26, 2001.
[8] IBM MARS Team, "MARS and the AES Selection Criteria", May 15, 2000.
[9] "A Request for Comments on Candidate Algorithms for the Advanced Encryption
Standard (AES)", Federal Register, Volume 63, Number 177, September 14, 1998.
[10] T. Pornin, "Automatic software optimization of block ciphers using bitslicing
techniques", Paris, France, 1999.
[11] E. Biham, RJ. Anderson, and LR Knudsen, \Serpent: A New Block Cipher Proposal",
in Fast Software Encryption | FSE 98, Springer LNCS, vol 1372, pp 222.
[12] B. Schneier and his colleagues, "The Twofish Encryption Algorithm: A 128-Bit Block
Cipher", John Wiley & Sons, 1999. www.counterpane.com/twofish-paper.html.
[13] A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, An FPGA-Based Performance
Evaluation of the AES Block Cipher Candidate Algorithm Finalists, IEEE
Transactions On Very Large Scale Integration (VLSI) Systems, VOL. 9, NO. 4,
AUGUST 2001
[14] R. L. Rivest1, M.J.B. Robshaw and Yiqun Lisa Yin, "The Security of the RC6TM Block
Cipher", RSA Laboratories Version 1.0, August 20, 1998.
[15] M. Y. Rhee, "Internet Security Cryptographic Principles, Algorithms and Protocols",
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, England, 2003.
[16] O. A. Dawood, A. S. Rahma and A. J. Abdul Hossen, The New Block Cipher Design
(Tigris Cipher), I.J.Computer Network and Information Security (IJCNIS).
133
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
F inding a standard way for controlling and managing the infrastructure of datacenters
is an outstanding demand. Thus the separation between the control plane and data
plane is proposed. Software Defined Environment (SDE) is a new approach where
the software based management and configuration of all resources, based on the
workload, can be achieved. Software Defined Network (SDN) is considered as the main
component of SDE. The latter is a term used by IBM for its "software-defined everything"
vision [1]. A part of SDN, the umbrella of SDE technology covers SD Compute (SDC), SD
DataCenters (SDDC) and SD Storage (SDS). In SDE environment, intelligent software is
responsible of managing and controlling the network, storage and/or datacenter infrastructure
instead of their hardware components [1]. L. MacVittie discussed the idea of Software
Defined and compares it with Object Oriented idea where the implementation of the data
134
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
layer is abstracted from the interface the control layer [2]. So it is easy to make
implementation changes with modifications in the interface.
The idea of software defining the datacenter components is discussed by several works.
V. Trhnen has designed his own SDDC by utilizing multi-vendor hardware [3]. His
proposed datacenter is based on VMware as the virtualization layer, HP server hardware as
the computing component, NetApp storage, and HP and Cisco networking equipment. All
the components provide an Application Programming Interface (API) that is used to control
the datacenter [3]. VMware in 2015 introduced an architecture using their software
components to create an SDDC as follows [4]:
- VMware vSphere: as a Server virtualization platform (instead of Software defined
compute).
- VSAN and vSphere: VSAN provides distributed storage capabilities and vSphere is
responsible of the Policy-based storage capabilities.
- VMware NSX: NSX provides a platform for Network virtualization (instead of
SDN(.
Until the present time there is no emulator designed to emulate SDE, SDS or SDDC.
Mininet is one of the widely used tools for emulating SDN [5]. Mininet is an emulation
tool which can build a virtual SDN network consists of hosts, switches, controllers, and links.
Mininet switches support OpenFlow protocol for more flexible customized routing and SDN
applications.
Darabseh et. al. customized Mininet to emulate several Software Defined experimental
frameworks [6-9]. They customized Mininets elements by adding storage parameters,
tables, and functions to the hosts, switches, and controllers, respectively to build SDS_host,
SDS_switches and SDS_controller. They proposed an SDsecurity framework in the same
way. They also integrated their SDS and SDSecurity frameworks into a software defined
secure storage. SDDC is built by integrating the SDN (using Mininet), SDS, SDSecurity
frameworks and with another block; the Software Defined compute (SDC) that is considered
as part of the virtualization and the computing resources.
The remaining parts of the present paper are; part-2 covers the concept of traditional
network architecture, while part-3 deals with SDE based network with its useful components
(SDC, SDS, and SDN). Part-4 gives an overview of the available tools for SDE. Finally,
the main concluding remarks are given in part-5.
135
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Datacenter is a facility used to house servers and computer hosts which are connected
using dedicated switches and links. Current Datacenters may contain huge number of hosts
with bandwidth and delay requirements [11]. The topology of the network has an important
effect on the agility and reconfigurability of the datacenter infrastructure to respond to
changing application demands and service requirements. Basic tree topology consists of
either two or three levels of switches or routers, with the host as leaves. In 3-tier topology;
at the root there is the core tier, at the middle there is the aggregation tier, and at the bottom
there is the edge tier where the switches are connected to the servers. In a 2-tier topology,
the aggregation tier does not exist [12]. A 3-tier tree topology is shown in Figure-1.
A more complex type of tree topology called Fat Tree topology is used by different works
[12, 13]. In Fat Tree a large number of routers and switches are used where the traffic is
forwarded based on the limited view of each network device. This networking model is
unable to meet the proper flexibility required with the current massive data amounts. The
coupling between the software and the hardware of the routers and the switches leads to an
expensive scaling and complexity in maintenance as well [14].
136
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
SDC term is used to describe the functions of server virtualization technology. These
serve as resources to virtual machines guests [1]. Hypervisors can be used as an SDC in the
SDE. Examples of these hypervisors are KVM for Linux Operating Systems [15], Hyper-V
for Microsoft [16], and ESXI vSphere from VMware [17].
137
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
associated with many counters that gather various statistics describing the events that the
switch must handle. The flow tables and their entries are all created by the controller.
SDN Controllers are considered as the main part of SDN. It acts as strategic point of
controlling, and managing the flow control to the routers or switches. The controller
communicates via southbound API with the forwarding plane, the infrastructure layer.
through the OpenFlow protocol. The controller communicates via northbound API with
application layer to deal with various network applications [20]. Figure-2 shows the SDN
architecture.
There are several emulators that can emulate the SDN networks, such as Mininet [5], ns-
3 and Estinet [21]. Mininet is widely used by SDN researchers because it is simple, open
source and written in Python programming language. It is based on Ubuntu Linux
distribution. Mininet consists of three main components: the host, which sends and receives
the packets, the switch, which stores the rules for forwarding the packets to their destinations,
and the controller, which is responsible for the operations of controlling and managing the
network [5]. Mininet also gives the ability to connect the SDN network to a remote
controller. There are several controllers that can be connected to Mininet, such as NOX,
POX, Beacon and Floodlight. NOX is the first SDN controller developed at Nicira networks
[22]. The main difference between NOX and POX is that POX is based on Python
programming language, while NOX is based on C++ programming language [23]. Beacon
and Floodlight are written in Java programming language [24,25]. The Mininet emulator has
a problem of its inability to handle large-scale networks. MaxiNet is created as an extended
version of Mininet for large scale networks. Its main idea is to build a distributed emulation
environment [26].
138
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Hypervisors can be used as an SDC in the SDE. The main advantage of SDC tools is that
multiple servers can run on one physical server, which translates into more efficient use of
resources. The main disadvantage here is that if there is a problem in this physical server,
all the virtual servers will be affected. Examples of the hypervisors are:
- IBM PowerVM: This is a virtualization technology available on IBM POWER
servers and can provide virtualized or physical server resources to the virtual
machines. PowerVM enables dynamic, non-disruptive, manual or automatic
resource relocation, such as dynamic CPU or RAM reassignment between different
logical partitions [1].
- Hyper-V: This is a virtualization technology introduced by Microsoft [16]. It runs
on x86 servers and supports Linux and Windows guest virtual machines. It is also
supported by IBM Cloud Manager as one of the underlying cloud technologies.
- ESXI : This is a virtualization technology provided by VMware [17]. It runs on x86
servers and supports Linux and Windows guest virtual machines. It is also supported
by IBM Cloud Manager as one of the underlying cloud technologies. The main
drawback when using such tool is the difficulty in accessing it by the administrator
directly from the working server. vSphere client software need to be installed on
another host and used to access the ESXI.
139
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
- IBM SAN Volume Controller (SVC) is a well-known and proven, robust storage
solution. SVC can virtualize huge number of external disk arrays to provide common
storage pool to hosts [1].
- IBM Storwize V7000 is a disk storage system which provides block storage to hosts.
Storwize and SVC run the same code with the same features as SVC. It differs from
SVC that it actually handles up to several hundreds of real physical disks, which can
be gathered in RAID arrays and then provide common storage pool for physical or
virtual servers [18].
- As mentioned, VSAN and vSphere can be used together as SDS tools, where VSAN
can provide distributed storage capabilities and vSphere is responsible for the policy-
based storage capabilities [4].
All the above tools are based on the virtualization idea. One of the main disadvantages
of such approach is that a more complex troubleshooting effort is required.
5. CONCLUSION
Virtualization and Software Defined technologies can be considered as the basic
elements of the next generation datacenters where all the components are either virtualized
or Software Defined. In this paper, the idea of Software Defined Environment (SDE) is
covered. SDE technology can be divided into three main technologies, SDN, SDC and SDS
with an orchestration or management tool. Software Defined Networking (SDN) is the most
well-known technology where the controlling functions are separated from switches and
routers. There are different research topics linked to SDN such as traffic engineering and
security. The idea of Software Defined Storage (SDS) is close to SDN idea where all storage
functions are dealt with in software. Software Defined Compute (SDC) can be considered
140
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
REFERENCES
[1] D. Quintero, W. Genovese, K. Kim, M. Li, F. Martins, A. Nainwal, D. Smolej, M.
Tabinowski, A. Tiwary, IBM Software Defined Environment, IBM Red-Book, August
2015.
[2] L. MacVittie, "Stop conflating software-defined with software deployed", Devcentral
2013.
https://devcentral.f5.com/articles/stop-conflating-software-defined-with-software-
deployed (Accessed on 14 March 2017).
[3] V. Trhnen, "Designing a Software-Defined Datacenter", M.S. thesis, Tampere
University of Technology, Tampere, Finland, December 2013.
[4] VMware Team, "Software-Defined Data Center", Technical White Paper, VMware Inc,
2015. (www.vmware.com)
[5] Mininet, Mininet Official Site, [online] 2017, http://mininet.org (Accessed on 14
March 2017).
[6] A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, A. Rindos,
"SDStorage: A software defined storage experimental framework", in IEEE
International Conference on Cloud Engineering (IC2E 2015), 2015.
[7] A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, A. Rindos,
"SDSecurity: A software defined security experimental framework", in Third
Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA-2015),
2015.
[8] A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk , A. Rindos, " A
novel framework for software defined based secure storage systems", Simulation
Modelling Practice and Theory 2016.
[9] A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, A. Rindos,
"SDDC: A software defined datacenter experimental framework", in Third
International Conference on Future Internet of Things and Cloud (FiCloud-2015),
Rome, 2015.
[10] N. Feamster, J. Rexford, and E. Zegura, "The Road to SDN: an intellectual history of
programmable networks", ACM SIGCOMM Computer Communication Review, New
York, April 2014.
[11] S. Seo, "Dynamic Traffic Engineering for Improving Energy Efficiency and Network
Utilization of Data Center Networks", Ph.D. dissertation, Pohang University, Korea,
December 2013.
[12] M. Al-Fares, A. Loukissas, and A. Vahdat, "A scalable, commodity datacenter network
architecture", in ACM SIGCOMM2008 Conference on Data Communication, 2008.
141
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
142
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
1. INTRODUCTION
S
oftware companies depend more and more on enhancing and improving their work
procedures and processes to achieve their quality objectives.[1]
CMMI offers to software companies the ability to improve their software quality
system by exercising specific practices related to specific and generic goals to reach certain
required maturity level in software development process [2][4].
CMMI is a quality standard whose target is to improve the software development process. It
allows to measure the organization maturity level and to improve its capacity of software
development. This meta-standard directs software companies to establish theirs processes in
order to develop high quality software products. CMMI defines how to enhance and evaluate
143
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
processes among a set of activities called Process Areas which fully support software
development operations (like Project Planning and Management, etc.) [3][5].
CMMI meta-model allows software companies to measure their maturity level and then to
determine the needed set of best practices to improve their capacity of software development,
and to enhance quality of their processes and products [6].
It is important to note that CMMI identifies a set of practices for a software project
development and gives procedure examples to follow [7], but it doesn't guarantee the
complete success of software projects.
We should also remember that models are abstractions of systems. High levels of abstraction
allow easier understanding and handling of systems. Moreover, new approaches like the
MDE [12] aim to automate the use of models. MDE encourages the identification and the
separation between the different system functionality. MDE structures the application
development in several models and model transformations. The MDE framework specify a
meta-model for each system aspect. So, it can design separately the system different
functionalities through the definition of system models [12].
After that, the MDE framework builds the whole system through the model transformations
[12]. These transformations permit the integration of system different functionalities. Briefly,
MDE allows us to specify a methodology for defining problems and how to go towards
solutions [13].
144
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
-Measurement and
Analysis (MA)
-Verification (VER)
145
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Figure 2 shows an outline of the process areas related to project management and their
relationships
The process of project management may suffer from several problems, such as:
1- Delays in product delivery.
2- Misunderstanding of customer requirements.
3- Non-accurate estimation of project cost and time.
4- Lack of teamwork commitment according to software engineering principles.
To overcome these obstacles, the user should introduce improvements in project
management work processes and develop new work platform for project planning according
to CMMI recommendations.
146
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
The process of manufacturing of a software tool for project planning and management
must be based on several important requirements [11]. These requirements are:
3.1 Work Breakdown Structure (WBS)
WBS helps in determining the list of actions that describe all project activities. These
activities are not the same and vary from one project development stage to another. So, these
activities must be determined carefully for each stage, to provide project manager and
company administration the ability to fully control their projects. Although it is not easy to
determine these activities at the beginning of the project, this task becomes more straight
forward at advanced stages of project development process.
Estimation process plays an essential role in project planning. This process aims to
estimate cost and effort that needed to complete each activity of the project.
Estimations are determined by using many methodologies such as: Planning Poker, Function
points, use-case points [3].
Estimation should be done at the level of:
1- Project activities.
2- Management, training and follow-up tasks.
3- Change requests.
For each one of these estimation operations should fallow specific steps to provide good
results. Also the estimation takes consideration that any change in WBS project activities
will affect their estimation which will in its turn affect project schedule.
3.4 Tracking and monitoring project activities
147
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
This activity is used to monitor and trace all changes and projects activities, such as:
detections of non-compliances, change requests, bugs, defects This activity aim to ensure
the good study of all discovered issues related to the project and to perform the appropriate
amendments as required.
The Paper target to define an approach to build development processes conform to CMMI
recommendations and dedicated for several companies. And to built process to be easily
modified according to the changes of company work and/or to be easily adapted to other
companies. So, the CMMI tool creates a meta-model for each adopted CMMI process area,
then produces modeling tools starting of the meta-models for all the desired phases. The
models defined using some produced modeling tools are inputs to other produced tools. The
CMMI recommendations are reflected into the built process by using meta-modeling
techniques. This approach is flexible because the user can easily change the process tools by
introducing the changes in the meta-models that drive the development process, Then re-
produces the modeling tools.
Now, the paper will define the conceptual diagrams of project planning procedures and
practices as recommended by CMMI. Then, it will apply meta-modeling techniques to build
process tools as it is shown in the following sections.
To build a project schedule, the tool needs to define its tasks. These tasks are extracted as
follows: the tool starts with the class of project phases which are the definition of key stages
of the project. Each project phase is associated with class Procedures that represents a
range of activities (Activities) to be executed sequentially and interconnected one to many.
Procedures in their turn are defined by work stages containing a number of actions.
148
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
PA Goals Procedures
Figure 4 presents the conceptual diagram to generate tracking reports. This report should
contain:
Basic data date of the report and project stage.
Automatically collected data about: risk, general problems, inconsistencies,
deficiencies, change requests, defects.
Commitme
Tracking Report Meetin
nt
g
- SG 1: Establish Estimates
Estimates of project planning parameters are established and maintained [1].
149
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Plan for the management of project data. -CMMI PAs Project Activity
Link(1 n)
-PA Goals Project Activity
Link(1 n)
-Goal Practices Project Activity
Link(1 n)
Plan for resources to perform the project. Schedule
Plan for knowledge and skills needed to - Project Schedule
perform the project. - Procedures
Plan the involvement of identified - Project Schedule
stakeholders. - Project Activity
Establish and maintain the overall project - Project Schedule
plan. - Tracking Report
150
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
- Also the project planning defined class Project schedule, this class contains
attributes, these attributes are: task id, task name, start task date, end task date and
human resources. This class relation one to many with class Project phases, the
project phases contains attributes, these attributes are phase number and phase
name.
151
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
- The project planning defined class Procedure, this class contains two attributes,
these attributes are procedure number and Procedure name.
The class Procedure relations one to many with class Project Activities, also
relations with class Project phases by many to one.
First this paper used hierarchical diagram presented in figure 5 to handle any CMMI
process area.
152
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
Application
PP
SG1 SG3
SG2
Figure 5: Hierarchical diagram to handle a project planning PA.
it shows in the following sections how it did to integrate GMF with CMMI meta-model
previously presented.
so, it will be able to build special model according to CMMI meta- model taking into
account all constraints in this meta- model.
The following diagram shows how the user can drag and drop any specific goal that he needs.
153
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10thof April, 2017.
154
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. Case study
The paper displays how apply the ideas on software companies, MIS (Management
Information System) is software company in Damascus Syria, this company applied
CMMI tool in project planning process area.
MIS sets the attributes that are Compatible with the MIS requirement, so the tool directly
builds detailed class diagram, this class diagram is converted to XML File by meta-model
code, after that import the xml file to eclipse java tool (for example) to parse the content of
xml file, and the user can use the application easily.
Now, the detailed class diagram for MIS company in project planning Specific Goal_1 like
the figure 9:
The detailed class diagram is changed automatically when the requirement is changed for
another software company, thats mean the software companies just sets the attributes that
are Compatible with the its requirement and all the next steps are built automatically by
CMMI tool.
7. CONCLUSION
CMMI is concept of how make software industry and MDE is an approach that aims
to automate use models in order to build more complex systems,
This paper displays how the software company builds its projects compatible with
CMMI Standard, and displays Flexibility when the software company changed its
requirement, the CMMI tool automatically builds new detailed class diagram after that
export the final XML file that is mean the software companies just define the
requirement and another steps are generated automatically by CMMI tool.
Also the CMMI tool can easily add new phase or modify any phase concepts used in
defining the software product model.
155
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The paper explained approach on the Project planning process area in the CMMI
maturity level 2, the idea can be applied for all process area in five level in CMMI
Standard.
8. REFERENCES
[1] Mary Beth Chrissis And Mike Konrad And Sandy Shrum, CMMI For Development,
Version 1.2. CMMI Second Edition Guidelines for Process Integration and Product
Improvement.
[2] Ahern, Dennis M.; Clouse, Aaron; & Turner, Richard.
CMMI, Distilled: A Practical Introduction to Integrated Process, Improvement, Second
Edition. Boston: Addison-Wesley,2003.
[3] Ahern, Dennis M.; Armstrong, Jim; Clouse, Aaron;Ferguson, Jack R.; Hayes, Will; &
Nidiffer, Kenneth E. CMMI,SCAMPI Distilled:
Appraisals for Process Improvement.Boston: Addison-Wesley, 2005.
[4] Chrissis, Mary Beth; Konrad, Mike; & Shrum, Sandy. CMMI:Guidelines for Process
Integration and Product,Improvement. Boston: Addison-Wesley, 2003.
[5] Crosby, Philip B. Quality Is Free The Art of Making .Quality,Certain. New York:
McGraw-Hill, 1979.
[6] Curtis, Bill; Hefley, William E.; & Miller, Sally A. The People Capability Maturity
Model Guidelines for Improving the Workforce. Boston: Addison-Wesley, 2002.
[7] Deming, W. Edwards. Out of the Crisis. Cambridge, MA:MIT Center for Advanced
Engineering, 1986.
[8] Dymond, Kenneth M. A Guide to the CMMI: Interpreting the Capability Maturity Model
Integration. Annapolis, MD:Process Transition International Inc., 2004.
[9] Dymond, Kenneth M. A Guide to the CMMI: Interpreting the Capability Maturity Model
Integration. Annapolis, MD:Process Transition International Inc., 2004.
[10] CMMI for Development, Third Edition, Addison-Wesley Professional, by Mary Beth
Chrissis, Mike Konrad, Sandy Shrum, 2011.
[11] SEI 2006b CMMI Product Development Team. SCAMPI v1.2, Standerd CMMI
Appraisal Method for Process Improvement, version 1.2: Method Definition Document.
[12] Model Driven Architecture Applying MDA to Enterprise Computing, Wiley Publishing,
Inc, David S. Frankel 2003
[13] The Eclipse Graphical Editor Framework (GEF), Pearson Education, by Dan Rubel,
Jaime Wren, Eric Clayberg, 2012.
156
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Received: 20 March 2017 can be read by physicians to detect breast carcinomas. In this
paper, proposed Computer Aided Diagnosis system that can
Accepted: 1 April 2017
assist the doctors in hospitals to improve the diagnosis of the
Published: 10 April 2017 disease to detect cancer cells. Enhance the undesirable effects
the of mammogram images by using slantlet transformer , set
. .
INTRODUCTION
T
he Medical im ages helpful in the education area for learners by clarifying these
-
im ages will assist them in their projects [1]. The explanation of medical im ages
- -
acts the most significant and exciting part of technology. For many experts,
aiding physicians is becoming of high and advantage value by evolving a computer
assisted diagnosis for carcinoma [2]. Mammogram im ages are top-resolution x-ray
. . -
imaging of breast. This includes ray transmission during tissue and the dropping of
.
anatomic structures on a lm display or im age sensor. A linked with the x-ray imaging
-
dropping is a decrease in anatomic data into a 2D im age. Studies have display that the
-
death rate could decrease by 34% if all females age fifty and older have regular
mammogram [3]. In exercise of mammography imaging, there exist essentially two kind
. .
157
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Some proposals have been drawn from the scientific literature: Sara D. And Abbasi,
M. [2], breast cancer is scourge diseases amongst females, needing CAD system in
.
diagnosing tumors of br east cancer and helping medical technicians using classifier
.
based on SVM. Subbiah B. [5], reduce the number of false positives and false
negatives. by implemented a CAD that can help the radiologists. Leena J. Baskaran S.
and Govardhan A. [6] building a CAD for classification in digital mammograms using . .
THEORY
The transformation is a procedure that converts an object from scope to another scope so
as to have some paramount implied data, that used for CAD system [7] The aim of
transformation is to replace the data from time-space scope to time-frequency scope, that
produce leading compression outcomes [8]. The information on spatial scope is generally
less fixed than frequency scope. Thus, presented lazy and complex in spite of providing
higher accuracy [9].
Slantlet transform (ST) is founded based on an improved version of the usual discrete
wavelet transform filter bank where the support of the discrete-time basis functions is
reduced. However, Slantlet transform (ST) is according to an amended version of the
discrete wavelet transform (DWT) where reducing the backing of DWT-time basis
functions. For variant scales, ST designing variant filters unlike iterated filter bank
technique for the DWT. For each level, It utilizes distinct filters while DWT is
performed in the form of an iterative filter bank. [10]. Some feature of ST are [11]:
ST is a multi-resolution and better time localization.
158
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Filter bank of ST-Level , using the down-pointing arrows ( ) as shown in Figure (2)
appear down-sampling by 4 and transform matrix same size of im age. -
The in equation (1,2,3,4), filters coefficients of ST level 2 filter bank can be gained
as [12]:
H2= [0.27 , 0.395, 0.52, 0.645, 0.23, 0.1, -0.01, -0.148] ------------------------- (1)
F2= [-0.083, -0.12, -0.79, -0.197, 0.753, 0.344, 0.064, -0.474] ----------------- (2)
G1= [-0.512 , 0.828, -0.12, -0.195] ------------------------------------------------ --- (3)
G1r= [-0.195, - 0.12, 0.828, 0.512] ----------------------------------------------------- (4)
159
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The decision tree is a common approach for pattern classification and consider as
a class-labelled. Decision tree same to tree structure, so very inner node indicates a test
on an attribute, each branch acts an result of test, and any leaf node catch a class label [13]
.
. decision tree algorithm by Quinlan Ross presented in the year of 1986. ID3 utilizes
information gain measurement for choosing the attribute of splitting. It only accepts
categorical attributes in constructing a model of tree. 3 widely known diversity functions are
depicted below. Let there be a data-set S (training data) of C outputs. Let P (I) represent the
proportion of S that belongs to a class I where I is different from one to C for the classification
problem with C class [14]:.
||
Gain(S, A)= Entropy(S) (( || ) ()) (7)
Support Vector Machines : the modern technique in machine learning is SVM in recent
years, that is common in many pattern classification issus including texture classification
and pattern recognition . According to different kernels SVM maximizing marginal
range between classes with decision outlines drawn. Binary SVM is intended to job with
only 2 class by determining hyper-plane to split the 2 class. The patterns which nearest
to the margin which was chosed to define hyper-plane which known as support vectors.
[15].
METHODOLOGY
The phase structure of the Computer Aided Diagnosis system for breast cancer (CAD-BC)
.
made up of 2 phase: training and testing. Every one of the steps has predetermined functions.
Every function is depicted in detail in the upcoming sub-sections which can be shown in
following Figure 3. Mammography im ages Analysis Society (MIAS) implemented in this
-
research was taken from , which is a UK research group organization related to the
breast cancer. 250 im ages selected from the data base, 175 im ages used for training and 75
. - -
160
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
im ages used for testing. Enhance the undesirable effects the of mammogram im ages ,
- . . -
improving the fitness of the mammogram im age and produce the feature extraction step
. . -
simple and extra credible by using slantlet transform with clearness , rid from noise and
smooth by blocking detailed information. Region of interest(ROI) is the most important
step in CAD-BC. breast object is segmented from the background using means
.
each pixel in mammogram im ages is more than density to threshold remained otherwise
. . -
removed. extracted features are clue of ROI outcomes . For any mam mogram im ages, Gray . . -
Level Co-occurrence Matrix (GLCM) is build with distance=1 and aveage direction of
(0,45,90,135) degree. attributes are extracted based on GLCM are Contrast, Dissimilarity,
Entropy, Homogeneity and Standard deviation. These attributes are the input of the classifier
model . The classifier model built by using ID3 and SVM. The classifier model to test a new
woman's chest im age which is not exist in training set.
-
A- B-
Figure 3: The structure of CAD-BC: A- training of CAD-BC. B- testing of CAD-BC.
RESULTS
The performance of the CAD-BC is estimated by using confusion matrix, running
time and classification accuracy which has been obtained from the testing part by using
slantlet transforms can be shown in a table (1) , table (2) and table (3). Also, im ages quality -
after slantlet transforms measured by PSNR can be shown in a table (4). Table (5). Shows
the Comparison of CAD-BC with related work system and finally illustrated the simple
im ages of stages of mam mogram processing in figure 4.
- . .
161
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
PSNR
Normal 31.052
Abnormal 30.061
The implementation of CAD-BC compared with other related system with same data
set (MIAS database) as following table.
TABLE 5: Comparison with related work system
Item Accuracy
Sara D. and Abbasi 87%
Subbiah B. 91
Leena J. Baskaran S. and 93%
Govardhan A
Mohammed salih (CAD-BC) 92 % ID3
Mohammed salih (CAD-BC) 96% SVM
162
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
segmentation using means threshold, which extracted the object (breast), For the same .
testing set, the practical outcomes displays SVM classifier with accuracy of 95% and
ID3 classifier with accuracy of 92% based on MIAS database. it is strict to assume that
every individual attribute is superior to others based on outcomes . The five attributes used
in this paper which can be extracted from GLCM matrix, and which contain
information about im age features.
-
Enhancing the woman's chest cancer by using different transforms like framelet.
Appling a various classification techniques to build the classifier like naive , ANN.
REFERENCES
[1] Smitha P., Shaji L. and Mini M., "A Review of Medical Image Classification
Techniques", International Conference on VLSI, Communication and
Instrumentation (ICVCI), Karunagapally, 2011.
[2] Sara D. and Abbasi M., " Br east Cancer Diagnosis System Based on Contourlet
.
Analysis and Support Vector Machine", Department of Computer, Science and Research
Branch, Islamic Azad University, Khuzestan, Iran, 2011.
[3] Yajie S., "Normal Mammogram Analysis", PhD Thesis, Department of Computer
Science, University of Purdue, 2004.
[4] Monika S., "Computer Aided Diagnosis in Digital Mammography: Classification
of Mass and Normal Tissue", MSc Thesis, Department of Computer Science and
Engineering, University of South Florida, 2003.
[5] Subbiah B.,"Contourlet Based Texture Analysis and Classification Of Mammogram
Images", International Journal of Engineering Science & Technology, Vol. 5 Issue 6, p1228,
2013.
[6] Leena J., Baskaran S. and Govardhan A.," A Robust Approach to Classify Micro
calcification In Digital Mammograms Using Contourlet Transform and Support Vector
Machine", JCA (ISSN: 0974-1925), Volume VI, Issue 1,2013.
163
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[7] Matheel E, "Color Image Denoising Using Discrete Multiwavelet Transform" , PhD
Thesis, Department of Computer Science and Information Systems of the University of
technology, 2000.
[8] Panrong X., "Image Compression by Wavelet Transform ", the faculty of the Department
of Computer and Information Sciences, East Tennessee State University, Masters
Abstracts International, Volume: 40-01, page 0197, 2001
[9] Jing Y., Yong H. and Phooi Y. ,"Recent Trends in Texture Classification: A Review",
Symposium on Progress in Information & Communication Technology, pp. 63-68, 2009.
[10] Ivan W. Selesnick, "The Slantlet Transform", IEEE Transactions on Signal
Processing, Vol. 47, No. 5, May, 1999..
[11] Iman M. Gafer and Afrah L. Mohammed, "Slantlet Transform based Video
Denoising", Baghdad Science Journal, Vol. 8, No.2, 2011.
[12] N. B Patil, V. M. Viswanatha and S. Pande, "Slant Transformation as a Tool for Pre-
Processing in Image Processing", International Journal of Scientific & Engineering
Research, Vol. 2, No. 4, April, 2011
[13] Matthew N. and Sajjan G.," Comparative Analysis of Serial Decision Tree
Classification Algorithms ", IJCSS, 2013.
[14] Lavanya V. and Rani U.,"Performance Evaluation of Decision Tree Classifiers
on Medical Datasets", IJCA, 2011.
[15] C. Chen, C. Chen and C. Chen, A Comparison of Texture Features Based on SVM
and SOM, ICPR, vol. 2, pp. 630-633, 2006.
164
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
165
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Iraq as other countries works to satisfy targets of these goals through educating the
community to actively participate in achieving the goals of sustainable development,
especially after the significant decline experienced by Iraq in achieving the MDG after 2014
as a result of carrying the burden of the government to achieve those goals without the
participation of community. [3]
Website is one of the most common tools to disseminate information, thus this website is
designed to publish the SDGs and their targets as well as the statistics that relate to them.
Different programming languages have been used in designing this website such as PHP,
HTML, CSS, JavaScript, JQuery, AJAX and MySQL.
Iraq was able to achieve a reduction in the poverty rate from 23% to 19%, although it was
aspired to reach 15% by the end of 2015due to the economic prosperity during 2014.but the
wave of displacement due to "ISIS crimes", and the drop in oil prices which have negatively
affected the economic situation rising poverty rate to reach 22.5%.
The second and third goal: To ensure primary education for children (male and female):
The elementary school net enrolment rate has come to 94.7% in 2015, up from 87.3% in
2000
The Fourth, fifth and sixth goals: crises and health status:
The number of deaths of children under five has pointed to 17.4% in 2014
In 2014, 89.3% of the Iraqi population is utilizing an improved drinking water source.
Internet using has increased from 5.9 % of the total population in 2014 to 15.9 % in 2015.
[5]
166
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
3. WEB DEVELOPMENT
"Web development" usually refers to the main non design aspects of building websites:
writing mark-up and coding. In small organizations may only require a single developer,
while in large organizations and businesses, web development teams consist of hundreds of
people (web developers). There are three kinds of web developer specialization; Front End
Developer, Back End Developer, and Full Stack Developer. [6]
It's also known as client side development which is referring to all operations that are
performed in client side. Front end developers are responsible for a websites user facing
code and the architecture of its user activities. The main languages used at this side are
HTML, CSS and JavaScript numerals. [7]
It's also called server- side which refers to all operations that done at server side. The back
end of a website consists of a server, an application, and a database which responsible of
make front end possible. The languages used at that side are PHP, ASP.net and MySQL. [8]
The languages that have been used in designing this website are PHP, HTML, CSS,
JavaScript, Jquery, AJAX and MySQL. To design any simple static website there is a need
to use HTML&CSS while building dynamic website by using JavaScript to add interactive
effects in page, MySQL to store data and PHP to retrieve data from database. In this site
jquery and AJAX are used to get good performance because they use less number of codes
in programming that decrease time of processing as well as updating only a section of a page
not all.
4.1.WEB DESIGN:
It's what representation to a client and within seconds they will decide, rightly or wrongly if
you have what they need. Web designing is subset of web development
This website has five tables in MySQL database to store data as illustrated in fig.1 and fig.2.
167
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4.1.2.WEBSITE STRUCTURE:
The information and data gathering process include collecting all the required
information about the SDGs, writing the required needs and preparing all the necessary
resources to build the website.
The information architecture used to describe the planning of a website's structure. There
are two types of navigation structures wide and deep. In wide navigation, the main pages
are all visible together and for small sites, and deep navigation simplifies the main
navigation and groups related pages into categories, which selected for this website,
because it is the optimal solution for large websites as shown in Fig. 3.
168
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4.2. IMPLIMENTATION
The main interface of the website is designed by using HTML & CSS codes. The interface
includes many pages that show information and images about SDGs. All components of this
interface are explained below:
Navigation Menu: Consist of links to the pages: Home, SDG goals'(each goal has
separate page), Sustainable Development Concepts, Contact Us and Search engine. As
shown in fig.4 and fig.5.
169
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Page Content: It differs according to the page information. The most pages consist of
texts and images such as Home, SDG concepts and Read more pages. While other
pages like SDG pages consist of:
- Name of goal and image related to that goal in its page as shown in fig.6.
170
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
- Statistical, Targets, Indicators of each goal which is designed as a tab within the page.
It is scripted by JavaScript to exploit small space to write a lot of information.
- Each page of SDGs contains either text or input information of visitors that are stored
in a database. The database contains tables with the data of targets of each goal, user
information (name, email, and workplace), comments and replay to comment as
shown in fig.7.
News Slideshow: Its a set of images of news animated on same position each of which
has a brief text linked to its full story page. The slideshow is coded by JavaScript, set the
animation time to 5 seconds and animation type to fade.
Contact Form: User can send a message to the email account of the website admin by
this contact form. It contains 3 input fields (name, email address and message). The form
is coded by PHP used mail function to send message and used validation method in case
the user inserts wrong format of the input field. After clicking on the send button an alert
message will appear showing "message sent successfully" message as shown in Fig.8.
171
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. CONCLUSION
To achieve the goals of sustainable development, there must be political will and
participation of the fact of all categories of community
In this project, website for SDGs was created as a first site in Iraq that illustrates the
concept of SDG (targets and indicators) to spread cultural awareness of the importance
of sustainable development and its goals, it also works to help the specialists in the field
of sustainable development and those affected in to identifying problems and finding
solutions through displaying the statistical information data and users comments.
In this site: PHP, Jquery, and Ajax languages are used to get more performance for page
in loading. PHP is free fed, Jquery means less number of JavaScript code. Ajax used
when you have database request, can reload only part of page not all.
References
[1] UNEP, Integrating the three dimensions of sustainable development: UNEP, 2015, How
to achieve a balanced, ambitious and inclusive framework.
[2] D. Sachs and Jeffrey, The Age of Sustainable Development, 1st Ed. USA: Colombia
University press 2015.
172
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[3] A. Neameh, "Transforming our world: the sustainable development agenda for 2030,"
presented at the Good governance and sustainable development goals, Istanbul, 2016
[5] Ministry of planning, COSIT. The Millennium Development Goals in Iraq 2014 and view
on post 2015.Iraq: COSIT, 2016.
[6] Hoar and Ricardo, Fundamentals of web development. USA: person education, 2015.
[7] Murugesan, San, handbook of research on web 2.0, 3.0, and x.0:Technologies, Business,
and Social application, USA: published by O'REILY,1st Ed,2010.
[8] Nixon and Robin, Learning PHP, MySQL JavaScript, CSS &HTML5, 3rd ed. USA:
published by O'REILY, 2014.
173
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
E
-learning is one of self- learning patterns in which the individual learns via
computer, smartphone, tablets, and the Internet [1]. E-learning provides almost no
hindrances for self-learning as long as all the requirements are available, therefore
this method became well-known among those who desire to learn via Educational
technology, hence this method is considered as an important part of society today. One of
the well-known terms of E-learning is MOOC system [2].
MOOC term is an abbreviation of Massive Open Online Courses, which represent a
recognized model of self-learning. It is considered as one of the most developed, modernized
methods and the latest evolution of an open education resources [3]. It is an educational
courses and curricula prepared by accredited Universities and educational institutions [4, 5],
moreover; it is free and open on the Internet. MOOC have interesting features which include
feedback, homework assignments, evaluation, testing, and certification [6].
MOOC has developed a high-quality educational system which is accessible to the
masses over the world, therefore many educational experts and technologists predicted that
it will change the patterns of traditional education methods in the near future [12].
Now, international organizations and UNESCO adopt these types of learning and supports
these trends. Although new, adopting such system proved to have a high potential to direct
174
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the society towards knowledge, increasing growth of learning in the world, and promoting
the concept of lifelong learning [13].
Recent researches and articles showed that MOOC usage had spread all over the world,
hence MOOC is considered as a huge opportunity for learners to increase their knowledge
and experience in various fields [14].
MOOC encourages the exchange of knowledge, ideas and information among the
learners and teachers therefore it contribute to the enrichment of an open educational
environment [15]. Therefore In this paper a new design of MOOC website have been
developed for Iraqi academic institution; specifically for Informatics Institute of Higher
Studies to spread usage of E-learning in Iraq and also to establish the first E-Iraqi University.
2. DEFINITION OF MOOCS
Different definitions have been offered for the term MOOC by illustrating the four
words in the MOOC abbreviation. The key components of MOOCs are shown in Figure (1)
[16]:
1. Massive: massiveness in MOOCs refers to the number of course participants. Whereas
most of the MOOCs had a hundred participants so that some courses reached over
150,000 registrations. Massive reflects the capacity of the course to expand to huge
numbers of learners. The challenge is to find the correct balance between a large
number of participants, individual needs of learners and content quality [17].
2. Open: Openness consist of four dimensions (4Rs) Reuse, Revise, Remix, and
Redistribute. In the terms of MOOCs, it refers to providing a learning experience to a
large number of participants around the world regardless of their location, age and
level of education, without any requirement meaning no course fees to access high-
quality education, also openness can refer to providing open educational resources
(OER) e.g. course notes, video lectures, PowerPoint presentations, and assessment
[18].
3. Online: In MOOCs, the term online refers to the accessibility of these courses from
every spot of the world via the internet connection to provide synchronous and
asynchronous interaction between the course participants. In some types of MOOCs
example (blended MOOCs), learners can learn in part face-to-face as well as the online
interaction possibilities [19].
4. Courses: The term course in higher education is defined as a unit of teaching. In
MOOCs, it refers to the academic curriculum to be delivered to the learners,
Including OER, learning objectives, networking tools, and assessments [20].
175
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
3.COMPONENTS OF MOOC
MOOCs are the definition of dynamic social learning. It provides for participants the
opportunity to interact, connect and engage with others all over the world. MOOCs are
interactive and use quizzes ,assignments, and tests, moreover, videos blogs, wikis, Facebook
pages, twitter and forums to participate with students. Every MOOC course has a syllabus
that lists the learning goals and defines the scope of the topics accompanying with
discussions, assignments, and quizzes or tests [21]. The syllabus also consist of a weekly
schedule specifically for assignment submissions. The contents of an MOOC course consists
of video lectures, suggested reading materials, discussion forums and also assignments and
quizzes [22].
The video section is the most valuable and unique component of any an online course as it
enables an expert (the instructor) to deliver his /her expertise (built up over years of
researching and teaching a subject) in an extraordinarily efficient way. Students generally
dont need to purchase books for these courses, due to the fact all reading material is either
be provided inside the MOOC content or is linked to open access texts[23].
MOOCs offer interactive user forums that assist build a community for the students and the
instructors. Discussion forums in MOOCs aim to create the interaction between course
participants. Learners are able to share and discuss information and opinions with others
from all over the world .
In a typical MOOC, students view video lectures online and interact with one another using
discussion forums. Some MOOC courses involve students to take an online quiz or test with
multiple choice answers that can be graded automatically.
The assignments are an essential component of MOOCs .Some MOOC courses need students
to finish assignments and upload the answers into the MOOC platform. These assignments
may be evaluated and graded automatically or by instructor [24].
4. MOOC TECHNIQUES
MOOC techniques may differ from one platform to another, also in two different
courses within the same platform. Most techniques of the MOOC are the same as those used
176
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
in traditional classrooms, such as having a start and end time, quizzes, assignments, final
exam and certificate. But, MOOC platform might handle these differently depend on the
tools and technologies available to MOOC. Another technique that might be hard to apply in
classical classrooms and can be used in MOOC, is to create a community among learners by
integrating social media in the communication between participants [25]. In this section, we
discuss some of the main MOOC techniques in three categories. Although each technique is
listed under one category, some techniques might have an overlap with other categories [26].
4.1 Design Techniques
Design techniques are those that used the MOOCs connectivism theory as the main
method. They also draw the basic of MOOC principles and values to be achieved. Here are
some of these techniques :
Personalized curriculum: Course content of MOOC is designed mainly for online use
so that the lecture is divided into smaller parts, each of which represents a topic [27].
Hence, these topics could be taken independently based on the students need,
knowledge and available time. Moreover, each student can assessment their gained
knowledge at the end of each topic, either in a small quiz or in questions. Due to this
way, the student could focus on the actual topic rather potentially being lost in the
middle of the class while the instructor moves on to other topics [28].
Active retrieval practice: Incorporating the recovery of knowledge into MOOCs
improves the learning process. As research suggested, retrieval of knowledge is not
simply restating the facts, the act of reconstructing knowledge itself enhances
learning. Retrieval practice is not restricted to online learning. However, in an online
setting, all students are required to go through the same process [29]. Take for
example if the instructor asks a question during a lecture, one student might answer
the question while possibly half of the students were not aware that there was a
question posed in the first place. In MOOC, every student is forced to answer any
question posted during the video and engage with the material [30].
One-on-one tutoring: Peer tutoring has been proven to give the best learning result.
Using this technology, MOOC can simulate, to an extent, a tutor who is
customized and personalized for each student. Furthermore, if the course content
itself is satisfactory for some students, they could act as tutors for other students [31].
Global community: Having a massive number of students all over the world would
make a community around the MOOC course, so the students have the opportunity
to connect with each other by posting a question and providing an answer in an
impressively short response time [32].
4.2 Development Techniques
These are techniques that implement the design and ensure that the tool used achieves
the design goal. Example, the usage of customizable tools targets the personalized curriculum
technique in design. Moreover, inserting short quizzes within the course material targets
active retrieval practice. Below illustrate some additional development techniques [33]:
177
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
178
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Apache Window
Server s 10 HTML
5&
CSS3
MySQL
JavaScri PHP
pt
6. MOOC TOOLS/TECHNOLOGIES
There is many numbers of tools that could be used in MOOC, a lot of which we might
not be able to mention in this paper, however, we will point out the most widely used tools
in MOOC and highlight their importance to the MOOC platform. On the other hand, most of
these tools can fall into one or more of these categories [40]:
6.1 Content Management Tools
An example of these tools: video, audio, presentation and text .These are the tools that
deal with the main content of the course and they are the primary tools of MOOCs as they
are the course objects or the delivery tool of the objects that contain the initial knowledge
shared. The designer of the MOOC platform usually integrates more than one of these tools
to improve interaction. The content is uploaded or posted by the course instructor using one
of these tools, either via video, audio, presentation, or text document. In MOOCs, the
contents are rather short in time or small in size in order to enhance the students
understanding and gain of knowledge. Moreover, the contents usually include an assessment
tool to motivate the students understanding by applying a retrieval practice of the main idea
into the lecture. Althoughwe see the combination of the tools, content management, and
assessment tools, the content does not include all the knowledge that the students require.
Based on the original MOOC, or what is now called cMOOC, knowledge is created
and generated during the course as participants contribute to the course material through their
discussion about the topic. Although there is an area for discussion, contribution and
knowledge sharing in MOOC as we will see in the discussion tools is not linked to the
179
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
contents like the assessment tools, which makes discussions sometimes seem to be irrelevant
information rather than concrete knowledge [41].
6.2 Social Media Tools
An example of these tools: Facebook, Twitter, Google+, Linked in and My Space .
These are the tools that create the learning community and encourage collaboration among
participants to support the educational process in MOOC. Moreover, they open the learning
materials to the outside world and attract interest from others, as users begin to share their
MOOC activities and experiences within their own social networks [42].
6.3 Discussion and Collaborative Tools
An example of these tools: Discussion forums, Wikis, Blogs, Micro- blogs, and
Virtual study groups/meeting .
Discussion forums are the major and most common tool of communication used in any LMS.
Especially in traditional LMSs - it is the only tool that allows collaboration among
participants. For that reason, it has become a standard feature of LMSs. This feature as well
carried its way to MOOC platforms. The major purpose of discussion forums is to create a
learning community by encouraging students to share their knowledge and contribute with
their own discussion, either in a form of a question or comments similar to discussions in a
classroom. However, the tool was not intended at first to be used for educational purpose.
Students were not enticed to participate, as neither the system nor the designers promoted
such features [43].
The LMS can also include other discussion tools such as real-time discussions, Wikis, Blogs,
and Micro-blogs, all of which can facilitate engagement among participants and encourage
collaboration in a way that suits each individual. The new MOOC platforms do use some of
these tools to create the learning community, however, most of the time they are used in
isolation of each other and of the main course content [44].
6.4 File Management Tools
An example of these tools: Google Drive, Microsoft Office, and Drop Box .Shared
and collaborative files are the tools mentioned to in this category. Shared files simplify
collaboration between participants. Some of these tools permit single access to files, while
others which are better for collaboration permit multiple synchronous access. For example,
users can access the same file and work on the same document and are capable of seeing
their changes directly. The best example of these tools is Google Drive, which provides the
basic and most widely used collaboration files: documents, presentations, spreadsheets, and
drawings. It has the option to link other existing file types from a preset list. Due to the fact
that these tools are commonly used for collaborative deliverables, MOOC does not need to
use most of their functionalities. However, MOOC focuses on collaborative and shared
knowledge, which make Wikis and Blogs the perfect tools for that purpose [45].
6.5 Notification Tools
An example of these tools: Emails, RSS feed, and Posts. Notification tools are very
important in the MOOC platform as well as in any LMS. They could be used for group or
broadcast communication. On the other hand, not everyone has the desire or the time to
always check emails. Mainly with the many numbers of learners in the system, quantity of
180
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
emails could be massive. Hence, we need a smart tool that allows customization and
personalization of notifications. Having such a tool encourages collaboration and fast
response among participants by enabling notification with the most suitable tool that fits the
learners objectives. In addition, these tools can be included with the students daily used
accounts so it does not become an additional burden. One way to integrate personalized
notification is to partner with social media sites and enable one login feature. Using one login
via the different social media sites or email accounts, the MOOC course is connected to that
site and can drive notifications to the learners via the most convenient method to the learner
[46].
6.6 Assessment Tools
These are the tools that help instructors to create course assessments to record
students grades and progress. Most assessments need to be the automated-grading type. But
when it comes to open-ended questions, the assessment should use a different scheme or
style (i.e. peer assessment) [47].
181
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
8. WIREFRAME DIAGRAMS
A wireframe diagram shows the structure of web page using only outlines for each
widget and content type, as shown in Figure (4).The purpose of wireframe diagram is to
give basic idea about home page interface without any graphic design. Best toot that used
to draw wireframe diagram is Pencil [50].
182
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
9. CONCLUSION
In this paper a new developed design of MOOC system is offered. The newly developed
design is based on all recent techniques and tools that are needed to run online courses
building them from the ground up and right to provide students with certificates of
completion by using the most efficient languages that are known in nowadays; the PHP7
scripting language ,MySQL language, HTML language, CSS language and finally JavaScript
programming language. The new platform is constructed with advanced features to make
online education more effective than the traditional class room methods. It offers a safe and
an easy way for learners and instructors to exchange ideas, share content or information,
connect and collaborate-anytime, anywhere and other. The new web design is thought to
fulfill the most efficient features including instructor and student dashboards, online quiz and
certificate, progress tracking and support for multimedia classes, in addition to a mobile
friendly themes that are thought to save time and money. The new web page is designed and
implemented to fit the general curriculum provided by the Iraqi ministry of higher education
and is thought to spread usage of E-learning in Iraq and also establish the first E-Iraqi
University.
10. REFERENCES
1. Mosakhani, M., & Jamporazmey, M. (2010). Introduce critical success factors (CSFs) of
elearning for evaluating e-learning implementation success. Educational and Information
Technology (ICEIT), IEEE
2. Agboola, A.K. (2006). Assessing the awareness and perceptions of academic staff in using
e-learning tools for instructional delivery in a post-secondary institution: A case study. The
Public Sector Innovation Journal, 11(3), 1-6.
3. Ajadi, T.O., Salawu, I.O., & Adeoye, F.A. (2008). E-learning and distance education in
Nigeria. Turkish Online Journal of Educational Technology, 7(4), 1-7.
4. D Koller, A Ng, C Do, and Z Chen, "Retention and intention in Massive Open Online
Courses," EDUCAUSE Review, vol. 48, no. 3, 2013.
5. Anderson, D. Huttenlocher, J. Kleinberg, and J. Leskovec. (2015) Engaging with Massive
Online Courses, in WWW. ACM, 2014, pp. 687698. [5] C. G. Brinton and M. Chiang,
MOOC Performance Prediction via Clickstream Data and Social Learning Networks, in
INFOCOM. IEEE.
6. Caswell, T. et al. (2008). Open educational resources: enabling universal education.
International Review of Research in Open & Distance Learning, 9 .)1(
7. B. Fogg. .(2009) A behavior model for persuasive design. In Proceedings of the 4th
international Conference on Persuasive Technology, page 40. ACM.
8. Gilbert, S. Morton, and J. Rowley, "e-Learning: The student experience," British Journal of
Educational Technology, vol. 38, no. 4, pp. 560-573.
9. C. G. Brinton, M. Chiang, S. Jain, H. Lam, Z. Liu, and F. M. F. Wong. (2014) Learning
About Social Learning in MOOCs: From Statistical Analysis to Generative Model,
Transactions on Learning Technologies, vol. 7, pp. 346359.
183
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
10. McCallum, C. M., Thomas, S. and Libarkin, J., The AlphaMOOC: Building a Massive Open
Online Course one graduate student at a time, 2013, Issue 33, ISSN: 1887-1542.
11. Creelman, A., Ehlers, U., & Ossinnilsson, E. (2014). Perspectives on MOOC quality An
account of the EFQUEL MOOC Quality Project. INNOQUAL - International Journal for
Innovation and Quality in Learning , 2 (3), 78-87.
12. Creed-Dikeogu, G., & Clark, C. (2013). Are you MOOC-ing yet? A review for academic
libraries. Kansas Library Association College and University Libraries Section Proceedings,
3 (1), 9-13.
13. D. Russell, et al.(2013), "Will Massive Online Open Courses change the education?," in CHI
'13 Extended Abstracts on Human Factors in Computing Systems, Paris,France, , pp. 2395-
2398 .
14. J. Basque and B. Pudelko. (2010), Exploring the potential of blended learning to promote
retention and achievement in higher education professional study programs, 9th
International Conference on Information Technology based Higher Education and Training
ITHET, Cappadocia, pp. 383-390.
15. R. Gluga, T. Lever, and J. Kay.(2013), Foundations for Modelling University Curricula in
Terms of Multiple Learning Goal Set, IEEE Trans. Learning Technologies, vol. 6, no. 1,
pp. 2537.
16. Cooper, S. & Sahami, M.(2013 ), Reflections on Stanfords MOOCs: New possibilities in
online education create new challenges. Communications of the ACM56(2), 28-30, doi:
10.1145/2408776.2408787.
17. deWaard, I., Abajian, S., Gallagher, M. S., Hogue, R., Keskin, N., Koutropoulos, A., &
Rodriguez, O. C. (2011). Using mLearning and MOOCs to understand chaos, emergence,
and complexity in education. The International Review of Research in Open and Distance
Learning, 12(7), 94-115.
18. Gamage, D., Perera, I., & Fernando, S. (2014). Effectiveness of eLearning through MOOC:
lessons learnt in selecting a MOOC. The 22nd International Conference on Computers in
Education (ICCE 2014). Nara.Japan.
19. K. Veeramachaneni, F. Dernoncourt, C. Taylor, Z. Pardos, and U.-M. OReilly, Moocdb:
Developing data standards for mooc data science, in AIED 2013 Workshops Proceedings
Volume. Citeseer, 2013, p. 17
20. Martin, F. G. (2012). Will massive open online courses change how we teach?
Communications of the ACM, 55(8), 26-28. doi: 10.1145/2240236.2240246
21. Fini, A. (2009). The technological dimension of a massive open online course: The case of
the CCK08 course tools. The International Review Of Research In Open And Distance
Learning, 10 .)8(
22. J. Mackness and R. Williams.(2010), "The ideals and reality of participating in MOOC," in
Networked Learing Conference, London, pp. 266-275.
184
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
23. Kizilcec, R. F., Piech, C., & Schneider, E. (2013). Deconstructing disengagement: Analyzing
learner subpopulations in Massive Open Online Courses. Third International Conference on
Learning Analytics and Knowledge. Leuven, Belgium
24. Hew, K. F., & Cheung, W. S. (2014). Students and instructors use of massive open online
courses (MOOCs): Motivations and challenges. Educational Research Review, 12, 45-58.
doi: 10.1016/j.edurev.2014.05.001
25. Chew, Renee S.Y. (2011). Perceptions of online learning in an Australian university:
Malaysian students perspectives. Doctoral dissertation. Queensland University of
Technology .
26. I. Titov and R. McDonald.(2008), Modeling online reviews with multi-grain topic models.
In Proceedings of the 17th international conference on World Wide Web, pages 111120.
ACM,
27. Russell, D.M., Klemmer, S., Fox, A., Latulipe, C., Duneier, M., and Losh, E.(2013), Will
Massive Online Open Courses (MOOCs) Change Education? , in: CHI '13 Extended
Abstracts on Human Factors in Computing Systems. Paris, France: ACM, pp. 2395-2398.
28. Tomkin, J.H., Charlevoix, D.(2014): Do Professors Matter?: Using an A/B Test to Evaluate
the Impact of Instructor Involvement on MOOC Student Outcomes. In: Proceedings of the
First ACM Conference on Learning at Scale Conference. pp. 7178. L@S14, ACM .
29. Colvin, K. F., Champaign, J., Zhou, A., Fredericks, C., & Pritchard, D. E. (2014). Learning
in an Introductory Physics MOOC: All Cohorts Learn Equally, Including an On-Campus
Class. The International Review of Research in Open and Distributed Learning ( IRRODL)
, 15 (4).
30. Kop, R. (2011), The challenges to Connectivist learning on open online networks: Learning
experience during a massive open online course. International Review of Research in Open
and Distance learning, 12(3), 19-37.
31. M Bali.(2014), "MOOC Pedagogy: Gleaning Good Practice from Existing MOOCs," Journal
of Online Teaching and Learning (JOLT), vol. 10, no. 1, pp. 44-57.
32. K. Masters .(2011), "A brief guide to understanding MOOCs," The Internet Journal of
Medical Education, pp. 2-4,.
33. Manir, K. A. (2011). Implication of ICTs in libraries of higher education institutes: A
panacea catapulting library development in Africa. DESIDOC Journal of Library &
Information Technology, 31(1), 65-71.
34. T. R. Liyanagunawardena, A. A. Adams, and S. A. Williams, "MOOCs: A systematic study
of the published literature 2008-2012," The International Review of Research in Open and
Distance Learning, vol. 14, no. 3, pp. 202-227, 2013 .
35. Pant E., Comas-Quinn A. (2013), The Challenge of Open Education, Journal of e-Learning
and Knowledge Society, v.9, n.1, 11-22
36. Milligan, C., Littlejohn, A., and Margaryan, A.(2013), Patterns of engagement in
connectivist MOOCs, Journal of Online Learning and Teaching ,9(2), pp 149-159.
185
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
186
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1- INTRODUCTION
187
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
example, a database could contain Human Resource (employee and payroll) data; or
it may contain accounting data; another may contain sales data; and so on. Databases
are managed by a database management system (DBMS).
There is confusion between a database system and a database management
system, but the two are different. Whereas a DBMS is a set of software tools that is
used for storing and manipulating data. Database management systems on the other
hand have many different types, such as file store, document store, and relational
database management systems.
Examples of different types of databases include end-user databases, operational
databases, analytical databases, distributed databases, relational databases,
hierarchical databases and database models. Databases can be categorized depending
on the type of their content, application area and technical aspect. For example, a
deductive database is the combination of logic programming and a relational
database, while graph structures are used in a graph database for representing and
storing information. Database types may also include hypertext databases, parallel
databases, mobile databases, cloud databases, active databases, in-memory databases,
temporal databases, spatial databases, real-time databases, probabilistic databases
and embedded databases
2- VEHICLES DATABASE MANAGEMENT SYSTEM
The Vehicles Database Management System (VDBMS) has been developed to
the benefit of the Ministry of Higher Education and Scientific Research
(MOHEDSR). The system is responsible for the management of all the vehicles
owned by the MOHEDSR and that have been delivered to all MOHEDSRs
universities and institutions. Many types of vehicles such as personal use cars, buses
and trucks are all stored and organized by their categories.
The VDBMS has the advantage of being able to manage data effectively and
allowing users to perform multiple tasks easily. The VDBMS uses a single software
application to stores, organizes and manages a large amount of information.
Efficiency of operations is provided in this system as well as the reduction of the
overall costs. The VDBMS is important to the Ministry of higher education and
scientific research because it provides a highly efficient method in handling multiple
types of data. Some of the data that are easily managed with this type of system
include: vehicles records, person in charge, MOHEDSRs institutions, status of the
vehicle and vehicles types. This system was built with the aim to be extremely
versatile.
Without VDBMS, tasks have to be done manually and take a lot of time and
possibly a lot of paper work. Data can be categorized and structured to accommodate
the needs of MOHEDSR. Data is entered into the system and accessed on a routine
basis by specified users. Each user may be given a password to gain access to a certain
part of the system. A number of users can access the system simultaneously in
different ways.
The system database is relational type, this means that multiple tables are used
and relationships between these tables are defined using a schema in addition to data
elements. Data elements and records from each table are merged, depending on the
query to be displayed in specific table or provided as a report. The obtained results
188
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
are displayed in a form that uses the defined data elements whereas only the records
that meet the query criteria are shown.
3- AIM OF THE RESEARCH
This project aims to develop a database to store, organize and manage all the
related to the vehicles owned by the Ministry of higher education and scientific
research. The system is developed to make it easy to retrieve specific information or
build custom reports about any vehicle. The stored data that contain information
about the current status of any vehicle record can be update so the information will
always be up-to-date. Detailed information about every vehicle is stored such as
brand, Model, plate number, type and color. Figure 3.1 shows the categories of
VDBMS interfaces functions.
189
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the table, VEH_TYPE the name of the vehicle type same name registered by the
vehicle manufacture, P_CODE the category code of the vehicle. CODEN_RASH
table has the UCODE attribute as the primary key and other attributes that is used to
store related data to the Institute or university currently using the vehicle such as
division and department names. Figure 3.2 shows the Entity diagram of the created
tables and the attributes of each table.
The vehicle table contains one primary key which is the CODE attribute and five
foreign keys each one of them is the primary key of the tables mentioned above.
These five foreign keys are VEH_TYPE, VEH_P_TYPE, VEH_COLOR and
VEH_STATUS. Other attributes store the rest of the information related to the
Vehicle. Table 3.1 shows detailed information about the attributes of the VDBMS
Main table (VEHICLE).
190
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4-VDBMS INTERFACES
The system Interfaces were developed to cover all the database management
function that the system perform. Each interface has predefined purpose, these
purposes varies from adding new records, updating records to building reports. This
section will introduce the functionality of each interface.
4.1 Main Interface
Through navigation to all the system interfaces can be done. Figure 4.1 shows
the main interface. This interface has eight command buttons each one of them
represents a link to another interface, and one command button for exiting out of the
system.
191
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
192
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
This interface was designed based on the SQL command Update. The main
function of this interface is to update a previously added vehicle records same
attributes that has been added in the add new interface can be seen in this interface
in order to enable the user of making the required updates and changes to these
attributes. Figure 3.5 shows the Update interface.
193
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
194
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
195
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. CONCLUSION
This project introduced a database management system that stores organize and
retrieve records of all the vehicles owned by the Iraqi Ministry of Higher Education
and Scientific Research (MOHEDSR). Currently vehicles records are documented
manually by the employee. This method takes a lot of time when a new vehicle is
purchased out has been transferred between the ministry institutions. In addition
probability of error is high. Updating status or keeping track of vehicle take a lot of
time.
Using the proposed database management system reduces the efforts paid by the
employees in charge of managing these vehicles and saves time while retrieving
reports of the vehicle.in addition a custom built report can be obtained from the
system.
The system provides the following functions:
Storing detailed information about the vehicle. These information
include:
o Vehicle ID (primary key).
o Vehicle plate number.
o Vehicle status (foreign key).
o Document number.
o Vehicle category (foreign key).
o Vehicle year of manufacturing.
o Vehicle type (foreign key).
o Chassis number.
o Vehicle color (foreign key).
o Vehicle owner number.
o Vehicle official letter Number.
o Vehicle official letter date of the.
o City.
196
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6.REFERENCES
[1] T. Connolly And C. Begg, Database Systems A Practical Approach To Design,
Implementation,And Management, 6th Ed. Pearson, 2015.
[2] M. Mannino, Database design, application development, and administration, 3rd
ed. Boston: McGraw-Hill Irwin, 2007.
[3] A. Kriegel, Discovering SQL A Hands-On Guide for Beginners. Indianapolis,
Indiana: Wiley Publishing, Inc., 2012.
[4] T. Teorey, S. Lightstone and T. Nadeau, Database modeling & design, 4th
ed. Amsterdam: Elsevier, 2006.
[5] K. Kendall and J. Kendall, Systems analysis and design, 8th ed. Upper Saddle
River, N.J.: Prentice Hall, 2010.
[6] S. Bennett, S. Mcrobb And R. Farmer, Object-Oriented Systems Analysis And
Design Using Uml. London: Mcgraw-Hill, 2002.
[7] A. Dennis, B. Wixom And R. Roth, System Analysis And Design, 5th Ed.
Wiely, 2012.
[8] J. Price, Oracle database 11g SQL. New York: Oracle Press/McGraw-Hill,
2008.
[9] C. Zeis, C. Ruel and M. Wessler, Oracle 11g for dummies. Hoboken, N.J.:
Wiley, 2009.
197
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he Rehabilitation system is a modern medical monitoring system that can be
monitored and checked the case of the patients after doing the operation, many
of soft computing companies applied modern techniques and issued the software
that have contributed to assist the doctors to follow their patients remotely and check
their cases.
2. BACKGROUND
The basic architecture of the rehabilitation system can be consisted of medical sensors,
personal servers, clinical database, and the main server of the hospital; the medical sensors
can be connected with the personal servers by using the IEEE 820.15.4/Zigbee standard [1],
while the personal servers can be connected with the main hospital server through the 3G
198
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
networks. When the patients data are arrive to the main hospital server, the data are either
stored in the clinical data base or viewed from the doctors or the clinician via the hospital
LAN, and then the doctors can analyze these data and give the suitable diagnosis advices
accordingly [1]. Figure 1 shows the system architecture of the conventional rehabilitation
system.
3. RELATED WORKS
This section surveys previous works in structured of Rehabilitation systems as shown
below:
J. Bouchard, B. Prosperi, G. Bavre, M. Daud, and E. Jeandupeux [2], presented a proposed
software that uses a 3D model for representing patient and tool of medicine professionals.
Zhizheng Wu, Feng Li, Wenjun Mi and Jingtao Lei [3], proposed a new approach for Lower
Extremity Rehabilitation Robot (LERR), this approach presented a good design for a robust
controller for Rehabilitation Robot.
Stucki G, Bickenbach J, Melvin J. [4], presented a good discussion for securing access to
functioning data of cases and treatments for Rehabilitation system.
Dirk Nolte, Claudia Tschammler, Markus Henzler, Robert Linsenmann, and Johannes
Angermair [5], proposed a two-phase transplantation concept that represents a new surgical
ways that ultimately arose from the absence of therapeutic alternatives.
Ovidiu Filip, and Tudor Deaconescu [6], presented a good study and explanations about the
Rehabilitation equipment.
The motivation of the proposed work focuses on suggesting a good idea for storing the
database of patients cases and their treatments based on distributed servers concepts, as well
as presents a good engine for auto treatments.
The comparison between the related mentioned works and the proposed algorithm is the
proposed algorithm can give a new ways for managing and administrating the medical issues,
it can present a good way for storing a database with many attributes and entities for patients,
cases, diseases, medical treatments, diagnoses, and information about doctors who work
inside the hospital, as well as gives an auto engine researching algorithm for finding a
suitable doctor for a certain patients case, and monitors the patients remotely.
199
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
200
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure 3, through Figure 8. Figure 3 shows that the sensor that connected to patient 1 is
transmitted its data to a smart mobile device of doctor 1.
FIGURE 3. Sensor of patient 1 ready to transmit its packet of data to smart mobile
device of doctor 1
Figure 4 shows the outbound data format of patient 1 that is transferred to doctor 1
201
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure 5 shows that the data packet of patient 1 are arrived in the central router which is
located in a certain position at the hospital
FIGURE 6. Outbound data packet format of patient 1 which arrived at central router
202
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure 7 shows the data packet format of patient 1 which arrived at the smart mobile
device of doctor 1.
FIGURE 7. Data packet of patient 1 which arrived at the smart mobile device of doctor1
Figure 8 shows the outbound data format for patient1 when it is arrived at the smart mobile
device of doctor1.
FIGURE 8. Outbound packet format of patient 1 which arrived at the smart mobile
device of doctor 1
203
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. CONCLUSION
The Rehabilitation system can offer many medical services remotely, it is easy for the
doctors to check and monitor cases of their patients remotely. The proposed architecture gave
good results for that, this system can give additional features like storing data for different
patients cases with their treatments; it also offers a good engine for auto medical treatment
of urgent cases if there are no responses from corresponding doctors, as well as give auto
monitoring for patients cases. This proposed system can be applied within a certain zone of
operation, to exceed this zone for a wide range; the other modern techniques of wireless
network system must be adopted like 3G, or 4G networks.
REFERENCES
[1] Rajasekaran.S., Kumaran.P., Premnath.G., and Karthik.M. (2013). "Human Health
Monitoring Using Wireless Sensors Networks (WSN)". International Journal of
Application or Innovation in Engineering & Management, Vol.2, Issue 12, pp. 323-330
[2] J. Bouchard, B. Prosperi, G. Bavre, M. Daud, and E. Jeandupeux (2013). "A Predictive
Rehabilitation Software for Cerebral Palsy Patients". International Journal of Medical,
Health, Biomedical, Bioengineering and Pharmaceutical Engineering, Vol. 7, No. 8, pp.
456-459.
[3] Zhizheng Wu, Feng Li, Wenjun Mi and Jingtao Lei (2014), " Robust Controller Design
for the Cooperative Control of Lower Extremity Rehabilitation Robot". International
Journal of Control and Automation, Vol.7, No.4 , pp. 313-328.
[4] Stucki G, Bickenbach J, Melvin J. (2016), Strengthening Rehabilitation in Health
Systems Worldwide by Integrating Information on Functioning in National Health
Information Systems, US National Library for Medicine, National Institute for Health.
[5] Dirk Nolte, Claudia Tschammler, Markus Henzler, Robert Linsenmann, and Johannes
Angermair (2017), Two-Phase Transplantation (TPTX) Concept: A New Approach for
Instant Rehabilitation of Young Children after Avulsion of Central Incisor, Open
Journal of Stomatology, Scientific Research Publishing, 136-146.
[6] Ovidiu Filip, and Tudor Deaconescu (2017), Finite Element Analysis of Some
Pneumatically Actuated Wrist Rehabilitation Equipment, MATEC Web of Conferences
94, published by EDP Sciences.
204
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
205
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he consideration WLANS allow users in a local area, such as a university
campus or library, to form a network or gain access to the internet. Also
Performance or Latency by response time is an important factor and hot topic in
the world of computer communication and networking [1]. The ways people and
devices connect to the Internet have changed significantly in recent years. Numerous
highly capable wireless networking technologies have been developed and widely
deployed. Todays commercial wireless communications landscape is operating a
revolution in the way people access and share information [2]. In this paper concentrate
variety distance is up to hundred meters to connect computer1 and computer2 wired and
wirelessly methods. The recent society we live in relies heavily on communication [3]
is a wireless more than before. A computer network consists of a number of computers
joined together for the purpose of communicating and sharing resources [4]. Wireless
networking takes into consideration the range, mobility, and the several types of
hardware components needed to establish a wireless network [5], the range of distance
between two points wirelessly and wire connected is under investigation by performance
(time response). The least response time with longer distance is a target for both methods
of communication. Thus, the result test of distance time-consuming between two
connected computers with least response will be an appropriate solution for our paper.
A temporary network can be formed by a small number of users without the need of an
access point [6], and protocols needed for optimum performance. In the proposed
configuration of wireless networks with peer to peer LANs-private network and with
wired and wireless methods. Proposed wired private and wireless private network as
multipoint is shown in Figure (1).
Since our main objective is to advise on the LAN requirements of a prototype real-life
business and fine best result in the respect of least response time with longer distance. We
aim at producing an informed report on the LAN needs of any business. In order to do this,
the network designer must understand how computers communicate in two different phases
namely one and two. The two phases were mentioned in the previews section. The figure (2)
Show the phases unguided and guided communication in only two points, and it is suitable
for our evaluation. The paper starts with the background used for this research. Then, a brief
206
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
description of the system performance as well as the trial that took place, subsequently a
discussion of the survey results is present. Finally, paper finished with a summary and
conclusions.
Figure (2) phases unguided and guided proposed communication in only two points
2. BACKGROUND
Network or Networking of computers has an important role in nowadays society; from past
until now there are lots of modifications occurred in Computer networks and create new
computer networks generation. Each generation has improved the computer networks
performance [5]. Thus, the performance and computer generation have a direct relation
between them. Increasing of performance is a hot top in networking science and technology.
each modification in performance network is creating new generation; for example Two
decades ago, few people had access to a network. Now, computer communication has
become an essential part of our infrastructure. Networking computer are everywhere and
used in Government, Education, Commerce, military [6] and etc. The popularity of computer
network is returned to several aspects; time, space, distance, better quality of service (QoS),
Speed, power, real time activity [6] and etc.
The unguided networked houses or offices the make smarter house or smarter office, but its
not grantee for the better security than the guided network or designs for maximizing QoS in
complex networks must end with several important criteria [7]. An operational perspective
is the ability of the network to service an application effectively, without affecting its
performance and functionality [8]. The most important criteria are performance, reliability
and security. The performance criteria are mostly considerate for evaluation the speed of
wired and wireless network in our proposed system, in this paper the performance is a
selected criteria for testing and evaluation for guided and unguided point to point network in
different distance. The distance is variable:
2.1. PERFORMANCE
Investigation for wireless and wire point to point Performance is in many techniques with
transmit time and response time. Transmit time is the amount of time required for a message
(i.e. open index or home page) that travel from one device to another. The response time is
the elapsed time between an inquiry and a response. The response time is the elapsed time
between end of enquiry and the beginning of the response [9] (i.e. the response time in our
proposed system is the inquiry start the ping to server domain name by client until beginning
207
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
of response. its end of ping the domain name and beginning of response.). The figure (3)
Show the performance by response time by elapsed time between end enquiry and the
beginning of the response.
Figure (4) requesting time by elapsed time between end requesting files
Transfer and starting files transfer
The performance of a network depends on a number of factors, including the number of
users, the type of transmission medium [9] either wire or wireless. The capabilities of the
connected hardware and the efficiency of the software [9] are very important factor to
increase the performance. The better hardware capability and software efficiency improve
the response time. But in this paper are only two (connected guided and unguided) stations,
and used two different IP. Thus, the investigation is for the limited performance with variable
distance.
208
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1) Select to Start. 2) Click on Run. 3) Type COMMAND and click OK. 4) Once the DOS
prompt comes up type the following:
The Figure (5) shows all steps from start button to DOS prompt.
The black screen of MS DOS-prompt appear with all information about the connected client
to server and vice versa.
All Steps Complete. And all information are shown as below about ping in table (1) [10].
In order to find network latency statistics [8], the activity need to be performed on any
connected and worked network for determination measure and evaluate network latency over
time, and during different periods of the day to capture a representative sample of typical
network activity. This will be able to by analysing the return delay from a distant computer
with the ping command. Return delay times, measured in milliseconds, will be summarized
by computing the average latency (mean) and the range (maximum and minimum) of the
delay times.
The ping is a useful for any network activity or finds out the best performance, also can be
used to calculate the round-trip delay to the remote host. Ping software is working as open
source, which has resulted in the software that supports almost every OS [12]. The index or
home page designed as a static and Ping is the measurement of time taken for home or index
page to travel from one point to another over a network.
For example, Speed of information traveling from client computer to a server or appearing
the index page by client computer, thus traveling from any client to a server (down load a
website by any client). A 'ping' estimates a round trip time using interval timing responses
and will generally give a result that's measured in 'milliseconds'.
209
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Table (1) describes all ping information and applications that used for designing proposed
system[11].
The results of ping test shows in Figure (6a) by command prompt for wired communication
between server and client. Ping between two computers in an (peer to peer wired LAN), one
of them is server with the IP first computer is a server 192.168.1.1, and the other are clients
with IP second computer is a client 192.168.1.2.
However, in Figure (6b) by command prompt for wireless communication between server
and client. Ping between two computers in an (peer to peer wireless LAN), one of them is
server with the IP first computer is a server 192.168.1.1, and the other are clients with IP
second computer is a client 192.168.1.2
Figure (6a) test result of wire peer to peer LAN in ping by prompt command
210
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure (6b) test result of wireless peer to peer LAN in ping by prompt command
There must be different between two results ping test show witch one of them is better
private network (wire or wireless) in the distance of twenty meters. The result of private
network-wired is better than the private network-wireless with constant distance of twenty
meters between client and server. In general, the response time of the private network-wire
is lesser than the private-wireless network (LAN). The private network-wireless (LAN) is
very limited up to sixty five meters, but the private network-wire (LAN) distance is up to
hundred meters. The results show that private network-wire (LAN) is less than the private
network-wireless (LAN) in the fixed distance of twenty meters. All information are shown
as below about ping reply milliseconds (ms) for private wire and wireless network LAN in
table (2).
Table (2) describes all ping reply for private Wire and private Wireless network.
The table evaluation tests show a different between private Network-Wire LWAN
(PNWrL) and Private Network-Wireless LAN (PNWlessL). In PNWrL the suitable distance
limitation between client and server is hundred meters, but the distance limitation between
client and server approximately sixty five meters. The time response of PNWrL is much
better than PNWlessL because the signals easily reach more than hundred meters, but
PNWlessL signal difficultly reach to sixty five meters. This mean that after sixty meters the
signal will be weak and cause a communication problem but in wired after hundred meters
the signal is weak. Figure (7) show the ping result for PNWrL with distance twenty meters,
PNWlessL with distance twenty meters.
211
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2 wire
0 wireless wireless
Figure (7) show the ping result for PNWrL with distance twenty meters PNWlessL
with distance twenty meters
All information are shown as below about ping reply (ms) for private wire and wireless
network LAN in table (3).
Table (3) show the PNWrL and PNWlessL results which are same in send, received and
lost for twenty meters distance.
Finally table (4) show the approximate round trip in milliseconds (ms) for PNWrL and
PNWlessL
Table (4) show the approximate round trip in (ms) for PNWrL
Average 0 2
Figure (8) show the round trip minimum to maximum and average for PNWrL and
PNWlessL
212
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5
4
3
2
1
0
0 0.5 1 1.5 2 2.5 3 3.5
Figure (8) shows the round trip minimum to maximum and average for PNWrL
and PNWlessL
All tests with twenty meters of distance between two points show the wired
communication medium is better and less than the wireless medium. The round trip for
wireless is not as good as wire round trip because of the table (4) declare that the limitation
approximation round trip for wireless is from (1-4)-brown upper line in Fig(8), but the
limitation approximation round trip for wire is from (0-2)-green bottom line in fig(8). It is an
obvious the (0-2) limitation is acceptable than (1-4) limitation.
4.2 FORTY METERS DISTANCE: As mentioned before in section (4.1) the distance
between two points is twenty meters. The same test will be repeated for forty meters distance
and sixty meter distance. Ping between two computers in an (peer to peer wired LAN), one
of them is server with the IP first computer is a server 192.168.1.1, and the other are clients
with IP second computer is a client 192.168, Figure(9a) test result of wire peer to peer LAN
in ping by prompt command.
However, in Figure (9b) by command prompt for wireless communication between server
and client.
213
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure (10) show the ping result for PNWrL with distance forty meters, PNWlessL with
distance forty meters.
Figure (10) show the ping result for PNWrL with distance forty meters PNWlessL with
distance forty meters
The figure (11) shows the highest and lowest delay time for round trip of signals between
clients and server. The number in milliseconds delay time is very high if compared the
PNWlessL to PNWrL. round trip approximation is shows the better in response and where
to reactivate signals in order to avoid signal weakness. The weakness signals take it to
account as delay time and round trip maximum approximation.
214
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Table (6) show the approximate round trip in (ms) for PNWrL
Wire Wireless
Minimum 0 3
Maximum 1 13
Average 0 7
When the round trip is higher than usual is cause weak signal and or delay. Hence, reactivate
the signals by placing repeater hardware. In ping statistics for forty meters distance there are
no lost packet in send and received and showed table (3) in section 4.1. Table (6) show the
approximate round trip in milliseconds (ms) for PNWrL and PNWlessL for forty meters.
Figure (11) show the round trip minimum to maximum and average for PNWrL
Figure (11) show the round trip minimum to minimum and average for PNWrL
and PNWless
As mentioned before in sections (4.1) and (4.2) for distance the twenty and forty meters test.
The same test will be repeated for sixty meters distance for both PNWrL and PNWlessL with
the IP first computer a server is 192.168.1.1, and the other are clients with IP second
computer is a client 192.168. Figure (12a & 12b) tests result of wire peer to peer LAN in
ping by prompt command
215
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure (12a) test result of wireless peer to peer PNWrL for sixty meters distance
Fig (12b) test result of wireless peer to peer PNWlessL for sixty meters distance
All information are shown as below about ping reply milliseconds (ms) for private wire
and wireless network LAN in table (7). The results are very different.
Table (7) show the PNWrL and PNWlessL results which are different in send, received
and lost for sixty meters distance.
Figure (13) show the ping result for PNWrL with distance forty meters, PNWlessL with
distance forty meters. .
216
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
200
100 wire 1
wireless no wireless no
0
1 wire 1
2
3
Figure (13) show the ping result for PNWrL with distance sixty meters PNWlessL with
distance sixty meters
All results in wire media are reachable Distention but in wireless first reply is unreachable
distention. The approximate results between them are very clear and show that the PNWrL
much faster due to the distance. Table (8) show the approximate round trip in milliseconds
(ms) for PNWrL and PNWlessL up to sixty meter
Table (8) show the approximate round trip in (ms) for PNWrL
The results of test for round trip from minimum to maximum are affected by the distance
and number of users. The higher number of users make the approximate round trip is higher,
also longer distance make the approximate round trip is higher too. The number of users is
effect of round trip in a proper LAN either PNWlesL or PNWrL. Nevertheless, the
consideration is on distance between two points which are clients and server. Factors are
seriously caused a signal fault or weak signal is destination between CS and Number of users
(Clients). The similarity of PNWrL and PNWlessL results in packet sent, packet received
and packet lost.
Figure (14) show the round trip minimum to maximum and average for PNWrL and
PNWlessL.
The figure (14) shows the highest and lowest delay time for round trip of signals between
clients and server. The number in milliseconds delay time is very high if compared the
PNWlessL to PNWrL. round trip approximation is shows the better in response and where
to reactivate signals in order to avoid signal weakness.
217
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
120
100 Maximum Manimum
80
60
40 Round Trip
20 approximatrion Wire
0
0 1 2 3 4
Figure (14) show the round trip minimum to maximum and average for PNWr and
PNWless
The weakness signals take it to account as delay time and round trip maximum
approximation. When the round trip is higher than usual is cause weak signal and or delay.
Hence, reactivate the signals by placing repeater hardware. In ping statistics for forty meters
distance there are no lost packet in send and received and showed table (3) in section 4.1.
6.CONCLUSIONS
Since new adjustment is introduced in the modern communication, for example LAN-
wired and wireless. The ping is software that free to measure reply time, lost packet and
round trip. Round trip and reply time have a direct relation to number of users. Distance and
number of users are two important factors that affect the result test of round trip (Minimum
and maximum) and ping reply. The evaluation is achieved for a limited number of computers
in LAN-wire and wireless for windows server and clients. The accurate test result found that
numbers of users and distance are affected by using of ping.
218
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
7.REFERENCES
219
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
ABSTRACT
ARTICLE INFO
In Wireless Sensor Networks (WSN), the deployed sensor
Article History: nodes can sense the same measures from the monitored
Received: 17 March 2017 area and forward these redundant measures to the sink
node. Although redundant measures provide better
Accepted: 1 April 2017
accuracy but consume a lot of energy during the
Published: 10 April 2017 communication and the processing at the node and the sink,
and thus decrease the lifetime of the WSN. Therefore, the
Keywords: Wireless
Sensor Networks elimination of redundant measures and reducing the
(WSNs), Data communication cost are considered as essential
aggregation, APCA, characteristics during design the WSNs. In this article, a
Network Lifetime. Distributed Data Aggregation (DiDA) protocol for
prolonging the lifetime of WSNs is suggested. DiDA
protocol is an energy efficient approach for a clustered
network. DiDA works into cycles and each cycle
aggregates and reduces data dimensionality by using an
Adaptive Piecewise Constant Approximation (APCA)
method. DiDA was successfully evaluated using
OMNeT++ network simulator and based on sensed data of
a real sensor network. Percentage of Sent data to the Cluster
Head (CH), data accuracy, and energy consumption are the
performance metrics applied to assess the effectiveness of
the DiDA protocol. The conducted simulation results show
that the proposed DiDA protocol decreases the consumed
energy and extending the network lifetime, in comparison
with a method without using data aggregation technique,
whilst keeping the sensed data quality at the sink node.
220
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
I
n the last years, a novel type of networks is emerged called Wireless Sensor
Networks (WSNs) due to the fast development in the wireless devices, electronics,
and the technology of embedded computing. A WSN consists of a large number of
tiny low-cost limited-energy devices that can sense, process, store, and transmit data
of surrounding environment with limited capabilities across the network to the sink
node. The most significant resource in the sensor node that impacts on the lifetime of
WSN is the energy provided by the battery which is difficult or impossible to replace
(or recharge) it especially in the remote or hostile environment. One of the biggest
challenges in WSN is the lifetime maximization of the battery [1, 2, 33, 34]. Therefore,
it is important to transmit as less volume of data as possible to the base station (sink).
The sensed data received by the sink node may be similar because there is more than
one sensor monitors the same region. In addition, the large volume of sensed data
generated by dense WSN leads to high processing load on the sink node. Therefore, it
is necessary to improve the energy efficiency of the sensor network to operate over a
long period of time. This can be done by using an energy efficient ways such as Data
aggregation methods [3]. The main objective of data aggregation algorithms is to collect
and accumulate sensed data with removing redundancy from sensed correlated data
generated by closely located neighboring sensors so as to save the energy thus extend
the network lifetime [3, 4].
Data gathering can be either triggered events (such as forest fire and gas or oil leaks
detection [5, 6]) or periodic triggering (such as habitat monitoring [7]). This paper
focuses on the periodic data gathering and aggregation in WSNs. In some specific WSN
applications, the accuracy of the observations is very critical for understanding the
underlying processes. Therefore, in order to design data aggregation algorithms for such
applications, it is very important to ensure the accuracy of the received sensed data by
the sink node.
This article provides the following contributions:
1- A new protocol named DiDA (Distributed Data Aggregation) is proposed to
aggregate the sensed data and prolong the network lifetime in WSNs. It uses an
energy efficient method for data aggregation for a clustered network. DiDA
protocol uses the Adaptive Piecewise Constant Approximation (APCA) method
to aggregate, and reduce the sensed data dimensionality.
2- DiDA protocol is evaluated by OMNeT++ network simulator using extensive
simulation experiments. DiDA has been compared to the results of the method
without using data aggregation technique.
The rest of this paper is organized as follows. Next section exhibits literature review.
Section 3 explains the description of (DiDA) protocol. Protocol evaluation is shown in
Section 4. Finally, we present the conclusion and future works in Section 5.
2. LITERATURE REVIEW
This section investigates some existing related works to data aggregation in WSNs. In
recent years, several proposed data management works focused on the data aggregation in
221
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
WSNs [8, 9, 10, 35, 36]. The principle objective of aggregating the sensed data is to eliminate
the redundancy in the sensed data and minimize the consumed energy thus extending the
lifetime of the network [11].
However, in order to reduce the data transferring, the works in [12]-[15] used simple
aggregation functions (such as max, min, avg, and sum) for aggregation. These methods do
not consider the correlation among the sensed data. Although they provide a high aggregation
performance but the accuracy of recovered data is badly poor. Therefore, these methods are
inappropriate for those applications that require a high data accuracy [16]. For example,
LEACH [17] protocol divides the network into several clusters. The cluster heads are chosen
during the setup phase whilst the data are aggregated using AVG method at each cluster head
in the steady phase so as to reduce the network data traffic [18].
HEED protocol [19] is the extended version of LEACH protocol. The cost of the intra-
cluster communication and the limits of communication range are included in original
LEACH. It elects the cluster head in a periodic way and based on two parameters: remaining
energy and the degree of the node. The authors in [12] presented EAST method for data
gathering based on spatial-temporal correlations. The nodes are spatially clustered by this
method into groups according to their positions in the region. The temporal correlation is
achieved by the cluster head to aggregate and transmit the sensed data to the sink only in the
case when they exceed a particular threshold. This method is suitable for event-driven data
aggregation [31]. It is not relevant for periodic data sending due to the processing and
communication overhead caused by the dynamic selection of the cluster head [18].
The works in [20]-[23] divided the sensor nodes into different clusters. One or several
nodes in each cluster are chosen as a representative set of nodes for data collecting and
sending whilst deactivating the other nodes in the same cluster. The nodes energy can be
saved significantly with these methods, but this can lead to important data loss due to a large
number of deactivated nodes.
The authors in [24] proposed a round-based clustering scheme that resolves the
transmission of redundant data in the network so as to improve network lifetime. Proposed
scheme works in four phases rounds: initialization, cluster-head selection, clustering, and
data aggregation. Proposed clustering scheme reduces energy consumption, thus increasing
network throughput by dealing with most of the redundant data. Several data aggregation
methods are proposed in [32].
This paper proposes a Distributed Data Aggregation (DiDA) protocol for lifetime
enhancement in WSNs. DiDA aggregates and decreases the data dimensionality using an
Adaptive Piecewise Constant Approximation (APCA) method. DiDA is assessed using
OMNet++ network simulator and based on real sensed data from a sensor network. The
results explain that the suggested DiDA protocol reduces the energy consumption and
prolonging the WSN lifetime compared to the results of the method without using data
aggregation technique while maintaining the quality of sensed data at the sink node.
222
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
at the level of the sensor node periodically and then transmits the sensed data to the cluster
head. After that, the cluster head sends the data directly to the sink. Figure 1 illustrates the
flowchart of the proposed DiDA protocol. Table 1 explains some parameters used in this
paper.
Start
Yes
Sample Capturing
End
S = Collect measures at SMPR
Data Aggregation
S AP = APCA Transformation ( S W )
Pc = Pc + 1
The PSN consists of nodes(1 , 2 , . . . . , ), each node is responsible for sensing the
data measures of the dynamic physical environment such as humidity, temperature, or
pressure etc. In PSN, the periods are partitioned into time slots. Therefore, each sensor node
n captures the data reading periodically. Consequently, the time-ordered sequence of sensed
data constitutes a time series, = {1 , 2 , . . . , p1 , p }, where is the total number of
temperature readings generated by sensor node every T seconds. The redundant
temperature readings captured by the sensor node increase in two states: short time slot and
slowly variation of a monitored area of interest.
Often, the volume of temperature readings series is very huge. Therefore, it is not practical
to send all the collected raw readings from every sensor node back to the base station due to
223
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the constrained bandwidth and energy consumption on data sending (radio transmission).
The dimensionality of temperature readings series (which is the number of observed
measures) have a direct proportionality relation with the communication cost. Thus, a smaller
can result in a significant reduction in the communication cost and hence, it will prolong
the lifetime of the sensor network [25]. In this stage, the DiDA protocol aims to perform
dimensionality reduction by removing the redundant data. It exploits the correlation nature
which is temporal among the sensed data of the sensor node efficiently by applying an
Adaptive Piecewise Constant Approximation (APCA) technique. DiDA protocol transforms
the temperature readings series S = {1 , 2 , . . . , p1 , p } that collected during the period to
an APCA representation in order to decrease the dimensionality of series. The APCA divides
the sorted temperature readings series into a set of constant value segments (with a bounded
reconstruction error ) of varying lengths based on data such that their individual
reconstruction errors are minimal. More formally,| (S ) | < , (S ) is the
reconstruction function, and is an error threshold. Long segments are used to represent data
regions of low activity, and short segments are used to represent regions of high activity [26].
The APCA representation of is given as follow:
S = {(dm1 , dr1 ), . . . , (dm , dr )}, dr0 = 0. (1)
The APCA approximates each segment S by a pair (dm , dr ) of two numbers, where
dm is the mean value of temperature readings in the segment which is defined as
=
1 +1
= (2)
1
224
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2: 1 // Starting point.
3: 1 // Number of Segments.
4: ( < )
5: 2
6: (_(S[: + ]) < )
7: +1
8:
9: S [] _ (S[[: + 1]
10: +
11: + 1
12:
13:
After segmenting the temperature readings series using sliding window algorithm, the
produced set of segments S = (1 , 2 , . ,
) is used by algorithm 2 to produce the
APCA representation for temperature readings series S. Algorithm 2 illustrates the process
of dimensionality reduction using APCA.
In the aggregation stage and at the end of every period, each sensor will have a set of
segments S with subsets(1 , 2 , . ,
), and two numbers per segment
( , ) that meet the reconstruction error bound , with no redundant measures.
The problem mentioned above is solved by constructing a set of segments with m subsets
that meet the reconstruction error bound .
4. PROTOCOL EVALUATION
In this section, we provided the framework of simulation and conducted a series of
simulations to assess the effectiveness and the relevance of the proposed protocol.
4.1. Simulation framework
In order to evaluate DiDA protocol, extensive simulations experiments are performed
with discrete event simulator OMNeT++ [29] and based on real sensor data. In these
simulations, we consider N sensors deployed in the lab. Sensors periodically capture local
readings (e.g., temperature) at a specified rate. We assume there is a single cluster head
225
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
located at the center of the lab. The cluster head receives sensed data readings from each
sensor node in the lab periodically via a single hop. DiDA protocol is distributed at each
sensor node and it is based on the dataset of Intel Berkeley Research Lab [30]. PSN in this
Lab includes 54 Mica2Dot sensors.
The sensed data of the weather (such as temperature, humidity, and light) are periodically
collected by these sensors once each 31 seconds. In our simulation, the sensor nodes use a
log file contains about 2.3 million readings collected previously by Mica2Dot sensor nodes
in the Lab. This article uses only one measure of sensor node measurements: temperature4.
There are 7 sensor nodes didnt used in our simulation because its data may be missed or
truncated. Therefore, the results are the average of 47 sensor nodes. Table 2 gives the selected
parameters settings.
In the experimental simulations, some performance metrics are applied to assess the
effectiveness of the DiDA protocol such as Percentage of Sent data to the CH, data accuracy,
and energy consumption. DiDA protocol uses the same energy consumption model discussed
in [30]. Energy consumed by the sensor node is caused by the communication unit (data
transmission and reception). Therefore, the cost of transmission is calculated for a m bits
message and for a distance d as follow
ETX (m,d) = Eelec m + amp m d 2. (7)
These experiment simulations consider the length of data reading m equal to 64. In fact,
we set the value of m to 64 bits because we consider each data reading as a double data type
that takes 8 bytes. In the case of transmission, 64 bits are added to m bits message which
corresponds to the frequency of data reading m. The length of the transmitted data packet is
calculated as follow DataPacket length = (Number of readings in the data set 2) 64 bits.
Hence, the packet length is the number of reading in the sensed data set with their frequencies
multiplying by 64 bits.
4
The other is done by the same manner.
226
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1) Percentage of Sent data to CH after applying aggregation stage: The result of the
aggregation in this stage depends on the chosen reconstruction error bound , the number of
the collected measures in the period, and the changes in the monitored region. Figure 2
illustrates the Percentage of Sent data to the CH without and with applying aggregation stage
at the end of simulation by every sensor node using DiDA protocol compared with the results
of the method without using data aggregation technique. The results show a maximum of
25% of the data sent to CH after applying the aggregation stage by DiDA protocol at each
period, whilst the rate is equal to 100% without applying the aggregation step. Therefore,
DiDA protocol decreases the volume of sensed data transmitted to the CH by removing the
duplicated measures at every period successfully. It can be seen at the step of aggregation,
when the or increases, the sent data are decreases. The reason behind this is remove a
larger amount of similar data by using APCA method.
120
DiDA ( =20 ) DiDA ( =100 )
DiDA ( =50 ) WithoutAggregation
100
80
60
40
20
0
0.03 0.05 0.07
Threshold
227
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Table 3: Data Accuracy (percentage of data loss after applying the aggregation inside the sensor).
Percentage of Lost Measures (%)
Without
Threshold DiDA DiDA DiDA Aggregation
(p=20) (p=50) (p=100)
228
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
transmitted to the cluster head, energy consumption, and acceptable data accuracy. In future,
we plan to apply the data aggregation into two levels: sensor node level and aggregator node
level (cluster heads). The first level is responsible for temporal correlation among the data
inside the sensor node whilst the second level deals with data correlation among neighboring
nodes. In addition, we plan to compare our proposed method with two existing methods in
the literature [35] and [36].
REFERENCES
[1] S. Misra, I. Zhang, and S. C. Misra, Guide to wireless sensor networks. Springer Science
& Business Media, 2009.
[2] A. K. Idrees, K. Deschinkel, M. Salomon, and R. Couturier, Distributed lifetime
coverage optimization protocol in wireless sensor networks, The Journal of
Supercomputing, vol. 71, no. 12, pp. 4578 4593, 2015.
[3] X. Zhai and T. Vladimirova, Data aggregation in wireless sensor networks for lunar
exploration, in 2015 Sixth International Conference on Emerging Security Technologies
(EST). IEEE, 2015, pp. 3037.
[4] S. Pino-Povedano, R. Arroyo-Valles, and J. Cid-Sueiro, Selective forwarding for
energy-efficient target tracking in sensor networks, Signal Processing, vol. 94, pp. 557
569, 2014.
[5] L. Yu, N. Wang, and X. Meng, Real-time forest fire detection with wireless sensor
networks, in Proceedings. 2005 International Conference on Wireless Communications,
Networking and Mobile Computing, 2005., vol. 2. IEEE, 2005, pp. 12141217.
[6] M. Dalbro, E. Eikeland, A. J. int Veld, S. Gjessing, T. S. Lande, H. K. Riis, and O.
Srasen, Wireless sensor networks for off-shore oil and gas installations, in Sensor
Technologies and Applications, 2008. SENSORCOMM08. Second International
Conference on. IEEE, 2008, pp. 258263.
[7] A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson, Wireless sensor
networks for habitat monitoring, in Proceedings of the 1st ACM international workshop
on Wireless sensor networks and applications. ACM, 2002, pp. 8897.
[8] B. Yu, J. Li, and Y. Li, Distributed data aggregation scheduling in wireless sensor
networks, in INFOCOM 2009, IEEE. IEEE, 2009 , pp. 21592167.
[9] Y. Zheng, K. Chen, and W. Qiu, Building representative-based data aggregation tree in
wireless sensor networks, Mathematical Problems in Engineering, vol. 2010, 2010.
[10] J. M. Bahi, A. Makhoul, and M. Medlej, Data aggregation for periodic sensor
networks using sets similarity functions, in 2011 7th International Wireless
Communications and Mobile Computing Conference. IEEE, 2011, pp. 559564.
[11] M. A. Sharaf, J. Beaver, A. Labrinidis, and P. K. Chrysanthis, Tina: a scheme for
temporal coherency-aware in-network aggregation, in Proceedings of the 3rd ACM
international workshop on Data engineering for wireless and mobile access. ACM, 2003,
pp. 6976.
[12] F. Ren, J. Zhang, Y. Wu, T. He, C. Chen, and C. Lin, Attribute-aware data
aggregation using potential-based dynamic routing in wireless sensor networks, IEEE
transactions on parallel and distributed systems, vol. 24, no. 5, pp. 881892, 2013.
229
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[13] H. Luo, H. Tao, H. Ma, and S. K. Das, Data fusion with desired reliability in wireless
sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no.
3, pp. 501513, 2011.
[14] X. Xu, X.-Y. Li, P.-J. Wan, and S. Tang, Efficient scheduling for periodic
aggregation queries in multihop sensor networks, IEEE/ACM Transactions on
Networking (TON), vol. 20, no. 3, pp. 690698, 2012.
[15] W. B. Heinzelman, Application-specific protocol architectures for wireless
networks, Ph.D. dissertation, Massachusetts Institute of Technology, 2000.
[16] C. Liu, J. Luo, and Y. Song, Correlation-model-based data aggregation in wireless
sensor networks, in Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th
International Conference on. IEEE, 2015, pp. 822827.
[17] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energyefficient
communication protocol for wireless microsensor networks, in System sciences, 2000.
Proceedings of the 33rd annual Hawaii international conference on. IEEE, 2000, pp. 10
pp.
[18] I. H. Brahmi, S. Djahel, D. Magoni, and J. Murphy, A spatial correlation aware
scheme for efficient data aggregation in wireless sensor networks, in Local Computer
Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, 2015, pp.
847854.
[19] O. Younis and S. Fahmy, Heed: a hybrid, energy-efficient, distributed clustering
approach for ad hoc sensor networks, IEEE Transactions on mobile computing, vol. 3,
no. 4, pp. 366379, 2004.
[20] J. Yuan and H. Chen, The optimized clustering technique based on spatial-
correlation in wireless sensor networks, in Information, Computing and
Telecommunication, 2009. YC-ICT09. IEEE Youth Conference on. IEEE, 2009, pp. 411
414.
[21] Z. Liu, W. Xing, Y. Wang, and D. Lu, An energy-efficient data collection scheme
for wireless sensor networks, in Advanced Communication Technology (ICACT), 2013
15th International Conference on. IEEE, 2013, pp. 6065.
[22] L. A. Villas, A. Boukerche, H. A. De Oliveira, R. B. De Araujo, and A. A. Loureiro,
A spatial correlation aware algorithm to perform efficient data collection in wireless
sensor networks, Ad Hoc Networks, vol. 12, pp. 6985, 2014.
[23] T. D. Le, N. D. Pham, and H. Choo, Towards a distributed clustering scheme based
on spatial correlation in wsns, in 2008 International Wireless Communications and
Mobile Computing Conference. IEEE, 2008, pp. 529534.
[24] K. T.-M. Tran and S.-H. Oh, Uwsns: A round-based clustering scheme for data
redundancy resolve, International Journal of Distributed Sensor Networks, vol. 2014,
2014.
[25] C. Liu, K. Wu, and J. Pei, An energy-efficient data collection framework for wireless
sensor networks by exploiting spatiotemporal correlation, IEEE Transactions on
Parallel and Distributed Systems, vol. 18, no. 7, pp. 10101023, 2007.
[26] A. Zifan, M. H. Moradi, S. Saberi, and F. Towhidkhah, Automated segmentation of
ecg signals using piecewise derivative dynamic time warping, International Journal of
Biological and Life Sciences, vol. 1 , pp. 181185, 2007.
230
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[27] Y. Wang, P. Wang, J. Pei, W. Wang, and S. Huang, A data-adaptive and dynamic
segmentation index for whole matching on time series, Proceedings of the VLDB
Endowment, vol. 6, no. 10, pp. 793804 , 2013.
[28] Y. B. Yahmed, A. A. Bakar, A. R. Hamdan, A. Ahmed, and S. M. S. Abdullah,
Adaptive sliding window algorithm for weather data segmentation, Journal of
Theoretical and Applied Information Technology, vol. 80, no. 2, p. 322, 2015.
[29] Omnet++ discrete event simulator. 2016, [Online; accessed 23August-2016].
[30] S. Madden, Intel berkeley research lab, 2004, [Online; accessed 25-August-2016].
[Online]. Available: http://db.csail.mit.edu/labdata/ labdata.html.
[31] M. Kamarei, M. Hajimohammadi, A. Patooghy, and M. Fazeli, An Efficient Data
Aggregation Method for Event-Driven WSNs: A Modeling and Evaluation Approach,
Wireless Personal Communications, vol. 84, no. 1, pp. 745764, 2015.
[32] Jesus, P., Baquero, C. and Almeida, P.S., A survey of distributed data aggregation
algorithms, IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 381-404,
2015.
[33] Idrees AK, Deschinkel K, Salomon M, Couturier R. Coverage and lifetime
optimization in heterogeneous energy wireless sensor networks. ICN 2014. 2014 Feb
23:60.
[34] Idrees AK, Deschinkel K, Salomon M, Couturier R., Perimeter-based coverage
optimization to improve lifetime in wireless sensor networks, Engineering
Optimization, vol. 48, no. 11, pp. 1951-72, 2016.
[35] Bahi, J.M., Makhoul, A., Medlej, M.: A two tiers data aggregation scheme for
periodic sensor networks. Adhoc & Sensor Wireless Networks, vol. 21, no. 1, 2014.
[36] Harb, H., Makhoul, A., Couturier, R. and Medlej, M., ATP: An Aggregation and
Transmission Protocol for Conserving Energy in Periodic Sensor Networks, In IEEE
24th International Conference on Enabling Technologies: Infrastructure for
Collaborative Enterprises (WETICE), pp. 134-139, 2015.
231
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION.
T
he new advanced networks always depends on many technological and
economic factors such as limited frequency resource availability, the cost and
operational conditions of developed radio equipment and optimization process.
Efficient analytical techniques are required for planning and analyzing the wireless
networks[1]. In regards to the third generation (3G),it has several problems such as,
232
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
technology is unripe, and resulting there is a big problems still exist from the base station
(BS) to the mobile station (MS). The speed of transmission is lowand instability. Speed
theoretically ranging from 384k / s to 480k / s. But the average speed in practicein
download from Internet only about 10K. Network coverage is bad due to the equipment
of base station (single station about 2m, 500kg-800kg), therefore, the coverage of large
areas will bring significant obstacles. The roaming is not international. For example,the
mobile brought to America or Europe, cant use 3G. The most extensive Global roaming
in 3G network is WCDMA, including the more developed regions in Europe and
America, Australia, etc. It is due to the many disadvantages of 3G, people have come
to expect 4G to solve these problems, which can provide higher data rates, greater
capacity and bandwidth [2]. LTE system also depends on many factors and is affected
by many factors which we spell out in this view. 4G LTE is the newtechnologyin the
mobile communicationsof cellular network that Equip us anexcellent speedin data
services. 4G technology is the acronym which refers to fourth generation mobile
communication technology. 4G LTEenabled us to transmit HD video and big image in
addition to other features[3]. Speed transmission theoretically Up to 100 Mbps. The
advantage of the bandwidth in 4G network is much higher than the bandwidth of 3G
network systems, Where approximately 100 MHz spectrum, That means roughly equal
20 times the W-CDMA 3G networks [4]. LTE can increase capacity by using standard
antenna techniques, widespread deployment and reliance on MIMO (Multiple-Input
Multiple-Output) antenna techniques[5]. Due to much increased data rates and reduced
latencies, LTE is pushing DSP based architectures to the maximum can be. The use of
higher order antenna systems are driving algorithmic demands forward at an exponential
rate [6].With the other side, using the kind optimal and appropriateof DSP chip in the
system will advance the capabilities of wireless broadband equipment, performance and
power savings, and other. There are many kinds of DSP chips can be integratedand
programmed with our work in LTE MIMO system to get the best results. This is due to
any types we'll use, and any types commensurate with the system. In this paper we'll
take some of the details about Texas Instruments DSP chip and Controllers
TMS320CS6, Qualcomm Snapdragon So Cs 835 and MSC8156 High-Performance Six-
Core DSP
Mobile communications have a major development over the past years. Theintegration in
performance of technologies are rapidly moving toward. Reality ofMobile broadband leads
us togrow quicklyin internet generation to having broadband access in everywhere. Estimates
show1.8 billion people have broadband since 2012, some two-thirds will be mobile
broadband consumers and most of these services offered by HSPA (High Speed Packet
Access) and LTE (Long Term Evolution)[7]. The main sign of this project is to improve the
Universal Mobile Telecommunications System (UMTS). Scientists are busy in establishing
233
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
a mobile broadband highwaywith more features that will be that suits and supports the
growing demand in the future, like efficiency improvement,enhancement ofall service,
reduce costs significantly and better integrationin (technical and performance). In December
1998(Third Generation partnership project) established. The members of 3GPP project are
ARIB/TTC (Japan), China communication standard association, Telecommunications
industry association (North America) and telecommunication technology associate (South
Korea). Because of the failure to meet the requirements fully by 3G, The need necessary to
build up the fourth generation 4G [8]. It is worth mentioning that MIMO technology as
shown in figure 1is the important basics to building LTE technology, where it is
characterized by:
1. Multiple antenna can be used to get rid of the detrimental effects of multi-path.
2. Superior Data Rates.
3. Increases throughput and range [10].
From the theoretical side, 4G is much faster than 3G. But before we start study the
difference between 4G speed and 3G speed, we must know first versions of 4G. When talking
about 4G, We will face some confusing things. Basically, there is 4G and 4G LTE. A lot of
people seem to think LTE is true 4G technology. Generally, if the 4G network described
without mentioning LTE, It most likely talking about a High Speed Packet Access (HSPA)
network. A faster version of the 3G GSM network is the HSPA network. But it's not faster
than LTE network [4]. LTE offers a major growth in cellular technology and it provides high
speed data and media transport as well as high capacity voice support well currently. Actually
234
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
LTE provides way to develop UMTS network towards fourth generation (4G) mobile
networks with today's 2G and 3G networks [11]. Transitional from 3G to 4G it will take a
long time, as is the case with 2G to 3G. Whereas, the mobile operators must look for the best
and fastest solutionsthat raise the performance and efficiency 3G networks while meeting the
requirements of the fourth generation development without upgrading all equipment [12].
And we can follow the evolution of LTE by embracing GSM (Global System for Mobile
Communication), GPRS (General Packet Radio Service) and EDGE (Enhanced Data rates
for GSM Environment) as well as WCDMA (Wide Band Code Division Multiple Access)
and now HSPA [9]. LTE It is an excellent design to providea very high bandwidth up to
several megabits, wherever it is more efficient use of the radio spectrum, reduce latency, and
enhancement mobility. The aim of this development that subscriber's interaction significantly
with the network with the (increase in demand and the speed of response) for mobile
multimedia services. In this,it became possible for subscribers accessreadily to their Internet
services, such as online television, video streaming, and interactive gaming, etc. [13]. Figure
2 describes the 3GPP group technical specifications.
235
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2G 9.6/14.4 Kbps
TDMA,
In one single channel, allowing multiple users by using
CDMA multiplexing. also during 2G, the send data are used in
phones side by side voice
3.5G HSPA 14.4 Mbps This generation supports increased throughput, larger
(peak) than the previous. In order to support the growing needs
1-3 Mbps of subscribers to data.
4G WiMax 100-300 Mbps With fourth generation find high Speed, high definition
LTE (peak) streaming, higher capacities and higher performance, In
addition to the increase of cover spaces.
1. Improvement the air interface allows increased data rates: LTE provides greater
Enhancement in performance of the system by using (OFDM) and (OFDMA) technology
rather than (WCDMA).
2. High Spectral Efficiency: LTE it gives a significant improvement in spectral efficiency
and it gives a field to mobile operators to increase number of subscribers within existing
spectrum with a detraction cost of delivery [14].
3. Reduced Latency: LTE technology has succeeded in reduces round trip times to 10ms or
less, which makes LTE provide more interactive and real time to services[15].
4. Flexible Radio planning: LTE can achieve optimal performance in a cell size of up to 5
km as an effective and successful than performance in cell size of up to 30 km radius but
performance is limited in cell sizes up to 100 km radius [16].
5. Scope of Services: smooth seamless service Available in LTE and users can access basic
data services Even if they are outside the coverage areas[12].
236
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The basic idea of the research is writing LTE system as program and apply it to an efficiently
DSP chip, later added noise and work to improve the system to adapts and raise his
performance. There are many kinds of DSP chip can be used it in practical model
construction, we will take idea to some of it:
237
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Six Star Core subsystemswith (DSP) core, each onereach to 1 GHz and 512 KB.cache
is unified (L2 /M2) memory.
Two DDR 64-bit,reach to (800 MHz data rate).
Voltage: (1-volt core, 2.5, 1.8/1.5-volt I/O).
TMS320C66x (C66x).
(Clock speeds) is available from (1.0) to (1.25 GHz).
There are additional accelerators for (3G chip-rate) and (4G bit-rate) processing.
238
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
We can clarification some differences between the DSP chips based on CPU core, Clock
Frequency, Memory Size, and Supply Voltage as shown in table 1:
voltage and
frequency 85 mV - 1.8 V
Supply Voltage 900 mV to 1.1 V 1-volt core, 2.5,
Varying to
1.8/1.5-volt I/O
reduce power of
CPU
239
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
system. The choice of algorithm it is the largest impact on the design. So, the first thing that
must be done choice the appropriate and most efficient algorithm. A "fully optimized"
program it is the most difficult in terms of understanding,thereforemay contain faults larger
than small programs [18].
2-Source code level: To improve performance, poor quality coding should be avoiding. After
that, some improvement in encoding can be actually reduce maintenance times. Some, but
not all.Taking into consideration, nowadays improvement compilers can improve the system
[19].
3-Build level: Between the compile and source level, directives can affect performance
options in a positive way in thecompiler and the sources of codes, such as disables the
unneeded codes (software features) by using preprocessor, or improvement for processor
models or increasecapabilities of hardware [19].
4-Compile level: Use the best and most efficient compiler leads to ensure that the executable
program Instead of the loss of time in the proceedings unnecessary [18].
5-Assembly level: At lowest level, assembly language using in writing codes, designed for a
particular hardware platform can be the best and most efficient in several ways. Many
operating systems used on embedded systems better to write in the assembler language due
to this reason. Programs (What is meant here is not programs that characterized it small) are
very rare written from the beginning to end in assembly due to it takes time and increase the
cost [18].
6-Run time: Run time optimization can be done by compilers and assembler, In addition to
modifying of code by itself as response to increase the efficiency of the system. Some designs
of CPU can perform many optimizations at runtime [19].
240
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The high performance can be obtained by implement the communication system using DSP
chip. This requires several important steps for the new system to be effective and integrated
in terms of construction. And in order to clarify the new system in a simplified formatas
shown in figure 9.
241
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
LTE - DSP System Model consists of several major parts, the most important are: LTE
program, it includes a multiple transmitter andreceivers (MIMO), It could be a mathematical
as follows:
Where y represent the received signal, H matrix represent channel, Xrepresent transmit
signal, nrepresent noise andh, k represent the location of the downlink beam from base station
(BS) to mobile station (MS), and a represent the number of users who connect with the
system.And drepresent subcarrier number, erepresent transmit antenna number [21].
Where2 the variance of additive, and Ir1 is an identity matrix of the size r1.MIMO channel
capacity using Shannons mutualinformation modifying of all input contrast matrices where
BA isthe bandwidth of the system.And capacity expression becomes:
C= BA log2 det[ Iz + H ] (5)
2
The received signal at the downlink for each user a can be represented as the following
equation:
Where the j=0 C , C = number of neighboring cell and j i, the pi , pj is the transmit
power ofdonor BS and neighboring BSs, also, the Fi,aFj,a is the fading channel gain for
donor and neighboring cellrespectively and Na isAdditive white Gaussian noise(AWGN) for
each a- user.
242
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Tm+1= Tmarrival_time(Tm)(8)
packet_no(Tm+1) = 1 (9)
The second important part is conversion LTE program to a C++ language with everything
contained in the program from equations and algorithms etc. Then insert the converter
program to DSP chip after choosing the appropriate type, and this is the third part. Fourth
part is the source of signal and noise,which is provided system by Signal, and at the same
timeprovides the system by noise for the purposes of the experiment and development. Let
it be, for example, a laptop. So we will need to useoscilloscope in final stage to measure the
impact ofnoise on the system. And then try to reduce noise effect, which mean that
decreasingbit error rate (BER) and increasesignal-to-noise ratio (SNR)tomake the system
more receptive and less affected. Where SNR can be a form mathematical as:
|,|2
SNi,j= (10)
+ =0 |,|2
There are a lot of applications and features of LTE MIMO, we can see some of them below:
a.In (Smart Home): LTE MIMO system it will be of high speed network, a send information
which does not need for cables, 4G communication allows more Seamless connectivity
between people. Based on 4G mobile technology. All things are going to be joined on the
Internet, and this is called internet of thinks.[24]
b. In (live TV): 4G way has many advantages, like long distance transmission, easy to use,
low in cost of equipment. So television media news that require a direct transfer.Alsousing
4G way will facilitate (power supply conditions) in harsh terrain.
c. In (field of Security): The (network monitoring) has become one of the main things in
environment of security. The Monitoring Currently becoming very obvious than the
previous, it trending HD. Who is looking for security want to develop cloud storage due to
large amount of data generated by security products program, supported large bandwidth and
stability of wireless speed are the first important,such as LTE MIMO system. [25]
d. Other Applications: Health care and emergency services has become easier, cheaper and
faster with LTE MIMO network, and other important services such as fight against floods,
earthquakes, flight and Airports [26].
Conclusion
243
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
some new technologies has been added to 4G wireless networks , Thistechnologies makes
4G more efficiency and speed than the 3G network. Covering the world and seamless service
are the basic goals of 4G,and it will achieve its goals through the optimal use of spectrum,
dynamic and capacity of broadband, etc. Where we can say that a full update for 3G. 4G can
use broadband more efficient to improve the(speed of transmission) and the (flow of
information) within the time unit, and the (e-commerce). Taking into consideration
Concurrent application of digital signal processors (DSP) in wireless base station designs to
continue as an effective design approach. This will ensure final products that are not only
scalable and cost-effective, but flexible and reconfigurable across multiple evolving
standards.
REFERENCES
[1] RimvydasAleksiejunas, "Simulation Framework for MIMO LTE Network Performance
Analysis," Innovative Infotechnolojies for science, Vol. 2(15), 2013, pp. 9-13.
[3] J. Huang, F. Qian, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck. "A Close
Examination of Performance and Power Characteristics of 4G LTE Networks", In
MobiSys, 2012.
[4] L. Hanzo, J. Akhtman, L. Wang, and M. Jiang. MIMO-OFDM for LTE, Wi-Fi, and
WiMAX: coherent versus non-coherent and cooperative turbo-transceivers.
Chichester, West Sussex, U.K. ; Hoboken, N.J: Wiley, 2011.
[5] Brian Stetler, F.C.C. Chairman: We Need to Auction Off More Spectrum, Gadgetwise
(blog), New York Times, January 7, 2011
[6] S. Sesia. I. Toufik, M. Baker, LTE The UMTS Long Term Evolution: A Pocket
Dictionary of Acronyms, Wiley, 2009
[7] Sanjay Kumar Sarkar, A Long Term Evolution (LTE) Downlink (DL) inspired channel
simulator using the SUI 3 channel model, Blekinge Institute of Technology, 3,15,
August, 2009
[8] L. Hanzo, J. Akhtman, L. Wang, and M. Jiang. MIMO-OFDM for LTE, Wi-Fi, and
WiMAX: coherent versus non-coherent and cooperative turbo-transceivers.
Chichester, West Sussex, U.K. ; Hoboken, N.J: Wiley, 2011.
244
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[10] Jim Zyren, Dr. Wes McCoy, "Overview of the 3GPP LTE physical layer", freescale TM,
3, 2007.
[11] http://eeecommunity.blogspot.com .
[12] A. N. Kulkarni, S. K. Sharman, A band Antenna with MIMO Implementation for U4G
LTE Wireless Devices, In: Proceedings of the IEEE APSURSI, vol.3, pp. 2215-2218,
2011.
[13] S. Sesia, I. Toufik, M. Baker (eds), LTE The UMTS Long Term Evolution: From
Theory to Practice, Wiley, 2009
[14] Kalis, A., A. G. Kanatas, and C. B. Papadias, Parasitic Antenna Arrays for Wireless
MIMO Systems, Springer, New York; Heidelberg; Dordrecht; London, 2014
[15] M. Chang, Z. Abichar, and C.-Y. Hsu, Wimax or lte: Who will lead the broadband
mobile internet? IT Professional, vol. 12, no. 3, pp. 26 32, 2010.
[21] IEEE, IEEE Standard for local and metropolitan area networks / Part 16: Air interface
for broadband wireless access Systems, New York, 2009.
[22] Baber Aslam, IEEE 802.11 wireless network simulator using Verilog, 11th WSEAS
International Conference on communications, AgiosNikolaos, Crete Island, Greece,
July 26-28, 2007.
245
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[26] Sedaghat, M., R. Muller, and G. Fisher, "A novel single-RF transmitter for massive
MIMO," Proc. ITG Workshop on Smart Antennas, 1-8, Mar. 2014
246
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
247
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
he Future wireless mobile systems will aim to support high quality of services
T
and high data rates by employing techniques that can enhance channel capacity
[1]. The transmitted data is interfered by channel noise, Co-Channel Interference
(CCI) when transmitted, and these noises and CCI affect randomly and suddenly
on all transmission bits. Diversity techniques, including spatial, frequency, and
time domain diversity, have been suggested to decrease the channel fading
effect. There are many techniques and algorithms to mitigate the CCI effect also. Sufficiently
spaced antennas are an attractive source of diversity since they do not typically incur in
bandwidth expansion as in frequency division diversity, and does not incur delays as in time
diversity. Though spatial diversity is available at transmitter and receiver, it may not be
possible to get much diversity gain at mobile terminal because of the limitations in space and
power [2]. Space Time Coding (STC) systems process transmit and receive signal waveforms
in temporal, spatial and coding dimensions to deliver high data rates with diversity and
coding gains, and MIMO technology has attracted attention in wireless communications,
because it offers significant increases in data throughput and link range without additional
bandwidth or increasing transmitted power. It achieves this goal by spreading the same total
transmit power over the antennas to achieve an array gain that improves the spectral
efficiency (more bits per second per hertz of bandwidth) and/or to achieve a diversity gain
that improves the link reliability (reduced fading). Because of these properties, MIMO is an
important part of modern wireless communication standards such as IEEE 802.11n (Wi-Fi),
4G, WiMAX etc. [3].
Orthogonal Frequency Division Multiplexing (OFDM) is the vehicle that drives modern
digital communications. Its high spectral efficiency and resilience toward multipath
distortion has made possible the increased data rates required in many devices. It is used in
many systems including DSL, IEEE802.11a, g, n (Wi-Fi), digital radio, digital TV,
IEEE802.16 (WiMAX), and 3G, 4G, and Long Term Evaluation (LTE) cell services [4].
MIMO with OFDM reduces the equalization complexities by transmitting different data on
different frequency levels to gain spectral efficiency and error recovery features, which will
offer high spatial rate by transmitting data on multiple antennas and transmission in Non-
Line-of sight (NLOS). Thus the MIMO-OFDM technique is used to achieve diversity. It
utilizes the three basic parameters that is frequency (OFDM), time (STC) and MIMO in
spatial. The MIMO-OFDM is the reproductive and highly famous services for wireless broad
band access. The combination of MIMO and OFDM accumulates the purpose of each and
every scheme that provides the high throughput [5].
248
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
reception are used to improve wireless communication systems capacity and data rate in
space-domain. In time-domain, different signals can be transmitted at different time slots
using the same antenna at the same time [7].
2.1 Alamouti code
The Alamouti space time coding scheme can be used to achieve diversity at the transmitter
and receiver if number of antennas are involved at the transmitter and receiver. The
approach as outlined by Alamouti is shown in Figure 1. The information bits are first
modulated using an M-ary modulation scheme. The encoder then takes a block of two
modulated symbols S1 and S2 in each encoding operation and gives it to the transmit
antennas according to the code matrix,
S= (1)
In equation (1), the first row represents the first transmission period and the second row
the second transmission period.
=- + + (3)
Where, n1, n2 are independent complex variables with zero mean and unit variance,
representing Additive White Gaussian Noise (AWGN) samples at time t = 1 and t = 2,
respectively, h1 is the path gain between the first transmitted antenna and the received
antenna h2 is the path gain between the second transmitting antenna and the received
antenna and r1, r2 are the received signals at the two time slots [8]. And the estimated
symbols are as shown below:
249
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
= + (4)
= - (5)
3. Convolutional Code
Convolutional codes are linear codes, many telecommunications applications have used
convolutional codes because of their ability to deliver good coding gains on the AWGN
channel for target bit error rates around 105 [9]. So it is a powerful and widely used class of
codes, which are used in a variety of systems including todays popular wireless standards
(such as 802.11) and in satellite communications.
Convolutional codes are often preferred in practice over block codes, because they provide
excellent performance when compared with block codes of comparable encode/decode
complexity. Whereas block codes take discrete blocks of K symbols and produce there from
blocks of N symbols that depend only on the k input symbols, convolutional codes are
frequently viewed as stream codes, in that they often operate on continuous streams of
symbols not partitioned into discrete message blocks [10].
When the encoded information is transmitted over the channel, it is distorted; the
convolutional decoder regenerated the information by estimating the most likely path of state
transition in the trellis. The receiver, of course, does not have direct knowledge of the
transmitters state transitions. It only sees the received sequence of parity bits, with possible
corruptions. Its task is to determine the best possible sequence of transmitter states that could
have produced the parity bit sequence. This task is called decoding, a decoder that is able to
infer the most likely sequence is also called a maximum likelihood decoder. The Viterbi
decoder finds a maximum likelihood path through the Trellis [11]. In this paper two types of
convolution code rate have been used depending on the type of modulation as in the Table
1.
Table1: Convolution code rates for different types of modulation
4-QAM 1/2
8-QAM 2/3
16-QAM 1/2
64-QAM 1/2
4. Interleaving
Interleaving plays a vital role in improving the performance of Forward Correction
(FEC) codes in terms of Bit Error Rate (BER). Interleaving is the process to rearrange code
symbols so as to spread burst of errors into random like errors and thereafter FEC techniques
could be applied to correct them. In conventional block interleaver, the bits received from
the encoder are stored row wise in the interleavers memory and read column wise as shown
in Figure 2, WiMAX uses a special type of block interleaver in which the Interleaver Depth
(ID) and pattern vary depending on the code rate and modulation type [12].
250
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
= 12 (6)
= (7)
5. Doppler Shift
The Doppler Effect is the change in frequency of a wave that is perceived by an observer
moving towards or away from the source of the waves. It is well-known that Doppler effects
generated by high speed mobility are the major reason for the reduction of data rates in
cellular systems. The Doppler Effect may occur from either motion of the source or motion
of the receiver as in Figure 3.
251
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
It is important to comprehend that the frequency of the signal that the source emits does not
actually change, but the wavelength () does; consequently, the perceived frequency is also
affected. When the receiving end moves towards the base station the receiving frequency
becomes higher and when is receding the receiving frequency becomes lower (see Figure
(3)). The Doppler shift in frequency depends on the velocity between the source and the
receiver and on the speed of propagation of the signal. Doppler frequency is given by the
formula:
f * (8)
252
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
253
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
0
2x2 MIMO-OSTBC-OFDM system,with Convolutional Code, MDS=5Hz
10
4-QAM,Flat-fading
8-QAM,Flat-fading
16-QAM,Flat-Fading
-1
10 64-QAM,Flat-Fading
4-QAM,Freq.-Selective
8-QAM,Freq.-Selective
-2 16-QAM,Freq.-Selective
10
64-QAM,Freq.-Selective
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
SNR(dB)
0
2x2 MIMO-OSTBC-OFDM system,with Convolutional Code, MDS=50Hz
10
4-QAM,Flat-fading
8-QAM,Flat-Fading
16-QAM,Flat-Fading
-1
10 64-QAM,Flat-Fading
4-QAM,Freq.-Selective
8-QAM,Freq.Selective
-2 16-QAM,Freq.-Selective
10
64-QAM,Freq.-Selective
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
SNR(dB)
254
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
0
2x2 MIMO-OSTBC-OFDM system, with Convolutional Code, MDS=100Hz
10
4-QAM,Flat-Fading
8-QAM,Flat-Fading
16-QAM,Flat-Fading
-1
10 64-QAM,Flat-Fading
4-QAM,Freq.-Selective
8-QAM,Freq.-Selective
-2 16-QAM,Freq.-Selective
10
64-QAM,Freq.-Selective
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
SNR(dB)
8. Conclusion
The Figures (5-7) which represent the performance of 2x2 system with FEC show better
performance when MDS=5Hz than the other two values 50, and 100Hz. For example by
comparing Figure 5 to Figure 7, the value of SNR in Figure 5 is 15dB for 64-QAM
Frequency-Selective Fading, but in Figure 7, the value of SNR=17.5dB for 64-QAM
Frequency-Selective Fading, so it can be concluded that increasing the Doppler frequency
by ten times (from 5 Hz to 50 Hz) just extra 1dB is needed to achieve same SNR, and when
increasing the Doppler frequency to 100 Hz extra 2.5dB is needed.
9. Reference:
[1] F.Delestre and Y.Sun, Pilot Aided Channel Estimation for MIMO-OFDM Systems,
University of Hertfordshire, London Communications Symposium 2009.
[2] Subhankar Chakrabarti, Study The Effect of Co-Channel Interference in STC MIMO-
OFDM System and Mitigation of CCI Using Beamforming Technique, MSc thesis,
National Institute of Technology, Rourkela, 2011-2013.
[3] Prof. Shivendra Singh, Prof. Vikas Gupta, and Shiv kumar Yadav, Performance Analysis
of MIMO-OFDM (802.11n System) for WLAN Channel Model, International Journal
of Engineering Research and Applications (IJERA) Vol. 3, Issue 3, pp. 946-949, May-
Jun 2013.
[4] Steven Charles Hemple, Analysis and Simulation of Wireless OFDM
255
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
256
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
W
ireless Sensor Network (WSN) composed of hundreds or thousands of nodes,
which deployed in high density manner in the area of interest for different
purposes such as battle field surveillance, disaster observation, smart homes and
many other applications [1]. Sensor nodes data reporting can be divided into two general
categories event-based data reporting and continuous data reporting. In event-based data
reporting, the sensor nodes send the data to the sink when an event triggered. On the other
257
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
hand, in continuous data reporting the sensor nodes continuously send their readings to the
sink such as humidity and temperature monitoring [2].
The high density deployment of sensor nodes in area of interest causes the data
redundancy at the sink node and leads to an unnecessary power consumption since some
nodes remain active whilst they sense redundant data. Therefore, we need a protocol for
scheduling the sensor activity by making sleep/active schedule for the sensor nodes that
minimize the data redundancy at the sink and eventually save the power since the power is
the most important constraint in the sensor nodes that must be considered when design any
protocol for the WSN.
The main contributions in this paper are as follow.
i. We propose a protocol, called the Energy-efficient Sensor Activity Scheduling
(ESAS) protocol, which exploits the correlation among the sensor nodes for
scheduling the sensors to minimize the data redundancy at the sink and maintain
the data accuracy and improve the network lifetime. ESAS works into periods.
Every period is composed of three stages: data collection, decision and sensing.
In data collection stage, all the nodes will be activated and send the data to the
cluster head to find the correlation among the sensors reading. The decision stage
executes a memetic algorithm at the sink node (or cluster head) to choose the best
set of active sensors for the current period and deactivate the other nodes. The
active nodes in the sensing stage continue transmitting the sensed data to the sink
node until the end of the current period.
ii. A modified optimization model that uses the data correlation among the sensor
nodes so as to decide which sensors stay active and which sensors will turn off.
iii. Extensive simulation experiments using OMNeT++ simulator are conducted to
demonstrate the efficiency of ESAS protocol. . Simulation results based on
multiple criteria (Number of active sensors, energy consumption, data loss ratio,
transmitted data ratio) illustrate that the proposed ESAS protocol can minimize
the energy consumption and transmitted data with suitable data loss ratio.
The reset of the paper is organized as the follow. Section 2 presents the related works on
various scheduling protocols in WSNs. Section 3 describes the proposed ESAS protocol. The
results are presented in Section 4. Section 5 demonstrates the conclusion and future works.
2. RELATED WORK
Energy-efficiency is one of the important requirements in WSN protocol design since
most of WSN nodes are battery powered. Several scheduling approaches are proposed in the
literature. The authors in [3, 4, 5] proposed scheduling algorithm for maintaining the
coverage and improving the network lifetime of WSNs. They proposed optimization models
based on both primary points and perimeter coverage model to optimize both the coverage
and the lifetime of WSNs. Some other existing approaches exploit the spatial correlation
among the sensor data in WSN for making sleep/active schedule in order to increase the
network lifetime [6, 7, 8].
The authors in [6] proposed a method in which the base station divides the sensors into n
sets by using closeness factor. This method supposes the close nodes can sense the same
data. Depending on shift base while the previous set of nodes exhaust its battery the other set
258
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
of nodes will be activated. The work in [7] is presented structure fidelity data collection
(SFDC) framework which consists of two phases: learning and data collection. In the
learning phase, the framework utilizes the spatial correlation of the collected data. It
introduces cluster formation approach that includes cluster head selection and active node
selection in each cluster based on similarity index in sensor readings. In data collection phase,
all the active nodes continue to send the data to the cluster head. Three algorithms are
proposed in [8] for active node selection and less energy consumption. The first algorithm is
Cover Sets Balance algorithm (CSB) to select a set of active nodes that have wide data
coverage ranges and high energy levels. It depends on the tuple (data coverage range, residual
energy) to find an initial active node set and then balance the size of the cover sets in order
to replace low-energy nodes. The second algorithm is Correlated Node Set Computing
algorithm (CNSC) to calculate the correlated node set with minimum set size and the
maximum geometric mean of residual energy of each node in the sensor network to use the
correlation results in the next algorithm. The third algorithm is High Residual Energy First
algorithm (HREF) to further reduce the number of active nodes selected by CSB algorithm.
Xu et al. [9] suggested a data-coverage method in which the active sensor can recover the
missing data of sleeping nodes. This method is based on the data correlation between the
sensor nodes. A Greedy Reduction Algorithm (GRA) to select the set of active sensors is
proposed. The missed data of sleeping nodes can be returned using the sensed data of active
nodes as well as the correlation between the sensor nodes.
ESAS protocol mainly divides the network lifetime into P periods. In each period, there
are three stages data collection, decision, and sensing as described in the Figure 1. In data
collection phase all the sensor nodes wakeup and send their sensed data to the sink for making
a decision using a metaheuristic optimization algorithm to provide the best representative set
of sensor nodes which are responsible for monitoring during the sensing stage. In the sensing
stage the active sensor nodes are responsible for sensing and sensing the sensed data to the
sink. ESAS protocol uses two types of packets: DataPacket for sending the sensed data of
each sensor node to the sink, and the StatusPacket used by the sink after achieving the
optimization for informing the all the sensor nodes with their new status (active or sleep).
259
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The DataPacket is 328 bits length (8 bits for header and 320 bits for 10 data reading). The
StatusPacket is 16 bits length (8 bits for header and 8 bits for the status of the sensor, 0 is
sleep, 1 is active).
In this paper, the main objective of ESAS protocol is to minimize the active sensor nodes
and maximize the network lifetime with maintaining an acceptable level of data accuracy.
Our mathematical optimization model is inspired from [10] with some modifications. Let S
= {s1, s2, , si, , sN} the set of the sensor nodes in the network of size N. Let Xij represents
a binary indicator for the correlation between the sensor i and the sensor j. In the decision
phase, we exploit the correlation matrix that extracted at the first stage to decide which
sensor node will remain active in the next stage of the period (sensing) and which node go
to the sleep mode until the next period for saving the power.
1 If the sensed data of the sensor i correlated with sensed data of the sensor j or
i=j
= (1)
0 Otherwise.
The data correlation between two sensor nodes is calculated by applying the Jaccard
similarity between their two data sets A and B as follow
|| ||
(, ) = || = ||+ || || (2)
The data are sorted in A and B and a difference function is used to compare the similarity
between each opposite elements inside A and B. The Difference function can be defined as
in (3), where is a threshold fixed by the application.
1 if | |
( , ) = (3)
0 Otherwise.
(
=1 ) 1 The number of correlations with other sensors
= (5)
1 Otherwise.
The optimization problem can be formulated as follow.
Minimize =1 (6)
Subject to
=1 = 1 (7)
We propose to use a metahuristic search algorithm for solving our optimization problem.
A memetic algorithm is suggested to find the best sensor set S after applying the optimization
model. The proposed memetic algorithm is a combination between a differential evolution
with local search (Hill climbing) to recombine the results and preventing the local optima.
260
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure 2 shows the pseudo code of the proposed activity scheduling based memetic
algorithm.
At the end of the decision stage, the sink node transmits a StatusPacket for every sensor
node based on the values of vector S that provided by the optimization algorithm based on
the memetic approach. The active nodes stay sending the data to the sink until the end of the
current period.
4. RESULTS
In this section, we conducted several experiments based on real sensor data from [11]
and using OMNeT++ network simulator [12]. In order to evaluate our ESAS protocol, some
performance metrics are used during this simulation such as Average of active sensor nodes,
Data loss ratio, Transmitted data ratio, and energy consumption. ESAS protocol applied the
energy consumption model that proposed by Heinzelman [13].
261
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Figure 3. Average number of active nodes for the deployed nodes in Intel Berkeley Research
Lab..
262
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
263
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. REFERENCES
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless Sensor Networks:
A Survey, Computer Networks, pp. 393-422, Aug.2002.
264
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[2] Makhoul, A., Laiymani, D., Harb, H. and Bahi, J.M. An adaptive scheme for data
collection and aggregation in periodic sensor networks. International journal of sensor
networks, 18(1-2), pp.62-74, 2015.
[3] Idrees AK, Deschinkel K, Salomon M, Couturier R. Coverage and lifetime optimization
in heterogeneous energy wireless sensor networks. ICN 2014. 2014 Feb 23:60.
[4]Idrees AK, Deschinkel K, Salomon M, Couturier R. Distributed lifetime coverage
optimization protocol in wireless sensor networks. The Journal of Supercomputing. 2015
Dec 1;71(12):4578-93.
[5]Idrees AK, Deschinkel K, Salomon M, Couturier R. Perimeter-based coverage
optimization to improve lifetime in wireless sensor networks. Engineering Optimization.
2016 Nov 1;48(11):1951-72.
[6] Mrs. Surekha K.B., Mr. Raghunandan V, Dr. Mohan K.G., Efficient Sleep Scheduling
Strategy to enhance the Network Lifetime of WSN International Journal of Engineering
Research,2015.
[7] Mou Wu 1, Liansheng Tan 1 and Naixue Xiong, A Structure Fidelity Approach for Big
Data Collection in Wireless Sensor Networks, Sensors 2015.
[8] Hongju Cheng, Zhihuang Su,Daqiang Zhang,Jaime Lloret,and Zhiyong Yu ,Energy-
Efficient Node Selection Algorithms with Correlation Optimization in Wireless Sensor
Networks, Hindawi Publishing Corporation International Journal of Distributed Sensor
Networks ,2014.
[9] Xu X, Hu YH, Liu W, Bi J. Data-coverage sleep scheduling in wireless sensor networks.
InGrid and Cooperative Computing, 2008. GCC'08. Seventh International Conference on
2008 Oct 24 (pp. 342-348). IEEE.
[10] F. Pedraza, A. L. Medaglia, and A. Garcia. Efficient coverage algorithms for wireless
sensor networks. In Proceedings of the 2006 Systems and Information Engineering Design
Symposium, pages 7883, 2006.
[11] Intel Lab Data. Available: http://db.csail.mit.edu/labdata/labdata.html.
[12] A. Varga. Omnet++ discrete event simulation system. Available:
http://www.omnetpp.org, 2003.
[13] Heinzelman, W.B., Chandrakasan, A.P. and Balakrishnan, H., 2002. An application-
specific protocol architecture for wireless microsensor networks. IEEE Transactions on
wireless communications, 1(4), pp.660-670.
265
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he growth of e-commerce in the global and emerging markets has created an
important and special interest on the measurement of the e-service quality and
also on the dimension of the e-services that influences on the customers
satisfaction and their experience on the shopping through e-commerce or e-
retailing (J. Yang, G. Miao, 2005).
With the rapid development of information and communication technology, Internet
and World Wide Web have become important tools in business which has a major
impact on business world. (Li, Hongxiu, Liu, Yong, Suomi, Reima, 2009) With the
increase of e-service adoption in business field, the importance of measuring and
monitoring e-service quality in the virtual world has been recognized, and e-service
266
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
quality posits to be a hot topic in research field. Some academic researchers have
already been conducted to develop e-service quality measurement. From the existing
literature, it is evident that these studies have been conducted mainly in the domains
of online retailing service, online shopping website quality, and e-service quality.
There has been limited attention on online service sector.
The activities of online retailers are focusing on the measurement and the
improvement of e-service quality that is provided to their potential customers. E-
service quality can be defined as the extent to which the web site promotes efficient
and effective shopping, purchasing, and delivering of products and services. The e-
commerce refers to generally all forms of transactions relating to commercial
activities including both organizations and individuals that are based on the
processing and transmission of the digitalized data. Since it was found by many
researchers that service quality is the main aspects of the e-commerce, there have
been many investigations done on how to improve the online services to attract the
online customers and also how to retain current customers.
This study makes an attempt to investigate the factors of the e-service quality which
have a drastic effect on the customers retention to go for e-retailing.
2. LITERATURE REVIEW
Web service or online service is related to various attributes of an online retailing
web site. According to (Renata Mekovec, 2007) the activities of online retailers are
focusing on the measurement and the improvement of e-service quality that is
provided to their potential customers. E-service quality can be defined as the extent
to which the web site promotes efficient and effective shopping, purchasing, and
delivering of products and services. The quality of service is one of the essential
elements of competitive advantage of online retailers whose objectives are to convert
web site visitors into customers and also to retain the customers in the competitive
market where other vendors are just a click away and are offering similar products at
a comparable price (S. Ba, J. Stallaert, Z. Zhang, 2005).
Since the Internet was discovered, Web sites have become an important channel for
companies to provide services to the customers. Businesses around the world now
operate more than 400,000 publicly accessible Web sites. In recent years, the
applications of information technology have provided a powerful platform for e-
service. One noticeable trend of e-service is the increasing use of self-service
technologies. According to (Rust and Kannan, 2003), the implementation of SSTs in
e-service extends more choices, more options, and, ultimately, more power to
customers in their transactions with businesses.
In Malaysia, internet business is not so advanced and is a new business area. It is
because not all the Malaysians are exposed to the online transaction through internet
267
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
and also they hesitate to make online purchasing due to various problems like
security, reliability, threats of frauds etc. (Noor HabibahArshad et al, 2008).
Furthermore, research on the determinants of service quality can be evaluated with
the help of two streams i.e. The first concentrated on the quality of the Web sites
interface design and hardware performance which was not able to fully capture the
service quality of a technical support Web site due to the neglecting of the quality of
the Web content for customers. And the second focused on service quality during the
order fulfillment process of transaction-based Web sites. (Po-Young, Chia-Yi, Yu-
Ling and Wei-Chen, 2009).
The growth of e-commerce in the global and regional markets creates a special
interest in the measuring of e-service quality and also in the investigation of the
dimensions of e-service as one of the important factors that influence customer
satisfaction and shopping experience of the customers of e-commerce web sites.
E-service quality covers various aspects of the e-commerce web site and diverse
elements of customer's experience. It includes all phases of the customers'
interactions with a web site and refers to the extent in which the e-commerce oriented
web site supports shopping behavior, as well as the processes of buying and delivery.
The rapid increase in the number of e-commerce web sites initiated research studies
that were focused on the measurement and evaluation of online service quality (A.
Parasuraman, V.A. Zeithaml, A. Malhotra, 2005).
2.1. E-retailing
E-retailers are major players in the field of electronic commerce and their success
would seem to depend on service quality, because they are selling the same products
that traditional retailers sell. E-retailing is the largest marketing activity in the rapidly
growing field of electronic commerce and, logically, perceived service quality would
seem to be the key success factor that lifts this new form of retailing above traditional
retailing because the products the two types of retailers sell are the same. However,
e-retailing service quality must be validly measured if its actual role is to be
demonstrated empirically. Moreover, a valid measure of service quality at each stage
of e-retailing is required if e-retailers seek to improve their service quality. (John R.
Rossiter, 2007).
Successful Web-based information systems (WIS) are critical for electronic retailers
to attract and retain consumers and deliver business functions and strategy. Previous
researches show that the gap in Internet usage has been declining between men and
women, and among different age groups. However, online customers still represent a
distinct group with higher income and education. In making their decisions, they
search the Web for information and explore lower prices and higher value. They have
more access to information and thus possess more market knowledge. They actively
exchange information with other customers. They may evaluate products and
purchase online or offline. Online customers may also have different decision-
268
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
making processes using different evaluation criteria that may rely on electronic tools.
(Fang Wang and Milena M. Head, 2001).
The Internet as a direct selling technique has attracted the attention of established
retailers and potential entrants. Although the concept of direct selling is not a novelty
for the sector, the scope that the Internet offers is much broader than the scope of
traditional direct selling techniques like catalogs and TV shopping. This new
communication and distribution tool has questioned the necessity of traditional
distribution channels in areas like software and music, and it is increasingly becoming
established in markets. In order to understand the behavior of retailers, both
incumbent and new, attention should be paid to the characteristics and the importance
of the intermediation function they perform between manufacturers and consumers.
(Veneta Andonova, 2003).
The internet together with the implementation of innovative business practices plays
a fundamental role in the development of e-commerce. However, at the early stage,
it was not uncommon that many virtual business models cannot achieve expected
outcomes because of the misunderstanding of consumer behavior and the
inconsistency with a particular market and social environment. Some service
providers intensively promoted the benefit of e-commerce and assumed that
individual consumers might be willing to use the services. The retail market in
Malaysia is characterized by the availability of a variety of different goods and
services in the metropolitan area. Many consumers enjoy shopping individually or
with friends and relatives. Individual style, taste and shopping behavior can be easily
influenced by fashion, in-group opinions and shared assumption in such a collective
society. Thus, subjective norm might affect consumer perception and shopping
behavior. The issue of social context being involved in the process of psychological
adoption of technological innovation should not be overlooked in certain
circumstances. (Ziqi Liao and Xinping Shi, 2009).
2.2.1 Information Quality
The Internet is an innovative form of information technology, yet most commercial
Web sites function as well-defined information systems. Information system quality
can be divided into system and information quality. (Zhilin Yang, 2004) System
quality refers to software development caliber, while information quality embraces
accuracy, timeliness, currency and reliability of information. The principal goal of
information systems service is to enable customers to function independently and to
conduct numerous transactions on their own. In addition, as end users, consumers
often seek desired product and service information through Web sites.
Information quality means to the correct information quality in the website. In e-
service, the accurate information quality makes customers always accessible to the
online service offered by online companies, which can help customers to have a good
image of online companies. If customers cannot use the online system when they
269
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
need online service, they will switch to some other online companies. Dissemination
of information not related to price favors a decision based on quality, thereby helping
the consumer to select the product which best suits his desires and needs. Greater
qualitative information transparency may mitigate the importance of price, thereby
affording greater profitability to the electronic retailer. With respect to the emphasis
on price information consumers tend to underestimate the frequency of more regular
promotions and overestimate the frequency of promotions. In other words, those who
offer promotions sporadically are doubly benefited, both by the mistaken perception
of consumers and by the expected higher profit margins obtained over the course of
time. (Luiz Antonio Joia and Paulo Sanz, 2005).
With the rapid development of information and communication technology, Internet
and World Wide Web (WWW) have become important tools in business, which has
a major impact on business world. In the virtual environment of e-service, for
customers website is the main access to online organizations and to a successful
purchase process. The deficiency of website design can result in a negative
impression of the website quality to the customers, and customers may exit the
purchase process. Website is the starting point for customers to gain confidence.
Website design can influences customers perceived image of company, and attract
customers to conduct purchasing online easily with good navigation and useful
information on the website. Website should provide appropriate information and
multiple functions for customers. (Li Hongxiu, Liu Yong, Suomi, 2009).
Since the main purpose of technical support Web sites is to provide information and
after-sales service, they do not emphasize online transactions. A review 3of functions
provided by real-world technical support Web sites shows that many do not even
support online transactions. The transaction-based approach, therefore, may also not
adequately measure the service quality of a technical support Web site. To date, few
studies have explored factors that determine customers service quality perceptions
of technical support Web sites. The present study, therefore, aims to fill this research
gap. (Po-Young Chu, Chia-Yi Chen, Yu-Ling Lin, Wei-Chen Wu, 2009)
This current study examines the combined effects of perceived information
availability and perceived e-service quality on customers retention value of e-
retailing.
H1: there is a positive effect of Information Quality of e-Service quality on the
customer retention towards e-retailing
2.2.2 Website Security
Security refers to the freedom from danger, risks or doubts during the service
process. This dimension holds an important position in e-service. Customers
perceive significant risks in the virtual environment of e-service stemming from the
possibility of improper use of their financial data and personal data, which is an
270
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
important barrier to online customers to purchase online. The following are the
attributes of security dimension of e-service quality.
- Protect the financial data of customers.
- Protect the personal data of customers.
- Terms on payment and delivery.
- Good reputation.
Research on service quality on the Internet has been mainly based on the
SERVQUAL model. Recent studies have also tried to model and measure e-Service
Quality. Research in the e-retailing context (Zeithaml, 2002) showed that e-SQ has
seven dimensions that form two scales: including efficiency (ability, easiness to get
to and navigate a Web site), fulfillment (having products in stock and delivering
them on time), reliability (technical functioning of a Web site), and privacy
(assurance regarding data sharing and security); and a recovery e-Service Quality
scale including responsiveness (provide appropriate data when problems occur,
online guarantees and mechanisms for handling returns), compensation and contact.
(Marianna Sigala&Odysseas Sakellaridis, 2004).
In e-service, interactivity between customers and companies offers opportunities for
companies to obtain information about customer, such as purchasing habits, needs,
preferences and so on, which makes it possible to offer customer personalized
service. Personalized service can improve customers satisfaction, and customers will
be reluctant to try other companies. Not only services and products, but also payment
and delivery in the service process, can be personalized, which is aimed at meeting
all the requirements and demands of customer. Personalization constitutes a vehicle
to retain the customer in e-service. This research examines the combined effects of
Website Security and perceived e-service quality on customers retention value of e-
retailing.
H2: There is a positive effect of Website Security of e-Service quality on the
customer retention towards e-retailing.
271
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The assessment of service quality is largely based upon Parasuraman et al.s (1988)
original development of the measure of perceived service quality. Considerable
empirical examination of the reliability and validity of the scale has resulted in a 22-
item scale. Reliability is the dominant dimension in traditional service quality. In the
context of the web, reliability is defined as the proper functioning of the website and
the ability to perform the promised services dependably and accurately. (Lee & Lin,
2005) Moreover, the reliability of the website can be reflected in the reliability of
the information that is captured by information quality. Information quality should
meet certain criteria, namely: accuracy, timeliness, relevance and understandability.
The presence of high quality information increases satisfaction with both the
experience and product purchase.
The research on the reliability towards service quality has passed more than twenty
years which says that it is one of the most important dimensions for all the services
provided. (Santos, 2003) quoted to reliability as the ability to perform the promised
service accurately and consistently, including frequency of updating the web site,
prompt reply to customer enquiries, and accuracy of online purchasing and billing.
Reliability specifically involves consistency of performance and dependability.
This research investigates on the factors of e-service quality influencing the
customers retention on e-retailing. Thus it is very important to find the contribution
of e-service quality which can change the customers retention in e-retailing in
Malaysia.
H3: Reliability of the Website is having positive influence on the customer retention
in e-retailing.
3. RESEARCH METHOD
3.1 Research Problem
The main problem for the e retailing companies is of convincing surfers to advance
beyond monitor shopping'' to make purchases and, more importantly, to become
repeat customers has proven to be difficult. On average, only 5 percent of unique
visitors to sites become customers and only 1.6 percent of all visits result in purchases
(Boston Consulting Group, 1998). The problem is that consumers develop entrenched
shopping habits exhibiting complex and interrelated behaviors and responding to
various motivators to make their purchase decisions. Successful e-commerce retailers
tap into these motivators and present new motivators to encourage consumers to alter
their normal pattern of behavior and purchase over the Internet.
(Brandt, 1997) quoted that the primary reasons for these difficulties reside in service
providers lack of experience in streamlining operations of this fairly recent channel
and their limited understanding of online customers usage behaviors. Moreover, as
online firms often possess limited resources, priorities must therefore be determined
among alternative service attributes when making investment decisions related to
272
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4. DATA ANALYSIS
4.1. Descriptive Statistics
Descriptive statistics are used to describe the basic features of the data in a study.
They provide simple summaries about the sample and the measures. The respondents
chosen for data collection are located in the areas located in the Selangor and Kuala
Lumpur of Malaysia. The major respondents targeted were the high level and highly
educated customers having experience of online purchasing in past. A set of
questionnaires was developed and sent to more than 200 respondents.
Data gathering proceeded by telephone interview with a follow up mail out of the full
instrument, inclusive of responses made to the subset of questions. Validation testing
273
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
was performed with a cross tabulation of non-respondents and respondents. From this
testing it was found that 148 respondents performed positively whereas the rest of 52
were considered as a non-respondent. However, the research was further extended by
investigating on the customers experience on e-retailing before. This investigation
would seek to know the confidence level of the customers.The data of the respondents
are described with the frequency distributions and depending on the particular
variables all the datas have been represented and then they are grouped into
categories first. Overall in total around 148 questionnaires were considered as 100%
contributed and were included as a final data. And as outlined below are the
demographic profiles of the respondents Table 1:
Table 1: Demographic profile of respondents
274
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1 to 5 year s 19 12.80%
more than 5 years 22 14.90%
no experience 98 66.20%
From the demographic results it was found that most of the respondents were at
the range of 28 to 37 with 43.2% of the respondents, whereas less respondents
were from the age of above 47 years with 6.3%. It is concluded from the age as a
demographic profile of respondents that the middle aged peoples are more
attracted towards the online purchasing.
Gender was also taken into account as a medium of profile to investigate on the
taste of the customers on the e-retailing. From the findings it was noted that around
64.2% of the respondent were masculine were as around 35.8% of the respondents
were feminine.
Qualification or education are very important to know whether the respondent is
properly educated to seek the knowledge on the usage of online purchasing. From
the analysis it was known that the respondents with degree as their prime
qualification were around 34.5%, whereas the master degree holders were found
to be of 23.6% which they are the bigger number. Thus from this finding it can be
said that the respondents were having a good understanding on the research topic.
The next question asked to the respondents was regarding the internet access
availability. Almost more than 80% of the respondents were having access to
internet via hand phone or through internet connection or broadband.
After the access of internet the next question that was asked to the respondents
was regarding the internet usage in their daily activities. The response was quite
positivistic as majority of the respondents use internet of more than 5 hours daily.
This shows the importance of internet in their daily life.
The next important question that was asked to the respondent was regarding the
online purchasing intention. This question was quite negative to the research as
the majority of the respondents were against e-retailing. From the finding it was
noted that around 48% of the respondents have never performed online purchasing
in their life, whereas around 18% shows their intention to do e-retailing in future.
This shows that the belief and trust on the e-retailing. Thus it can be said that the
antecedent variables taken in this research could increase the trust on the e-retailed
customers. This approach would increase the usage on technology in this 21st
century of modern era.
4.1.Correlation Test
Correlation analysis is used to know how the variables are correlated with each
other. For the collection of the datas the symmetric quantitative variables for the
Pearsons correlation coefficient is used. Before calculating the correlation
275
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
coefficients we need to screen the datas for the outlier. Pearsons correlation
coefficient assumes that each pair of the variables is the bivariate normal and it is
a measure of the linear associations. For the Pearsons correlation coefficient to
be efficient the variables need to be linear and accurate. For example there must
be a linear relationship between the dependent and the independent variables. And
as outlined in Table 2:
276
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
as outlined in Table 3 which shows the Reliability test of the variables . the
reliability test says that the Cronbachs alpha of overall is 92.7 % which indicates
us that the test is reliable and can proceed further. The closer Cronbachs alpha
coefficient is to 1.0 the greater the internal consistency of the items in the scale.
George and Mallory (2003) provide the following rules of thumb_ > .9
Excellent, _ > .8 Good, _ > .7 Acceptable, _ > .6 Questionable, _ > .5 Poor,
and _ < .5 Unacceptable. As our result comes under the range of excellent, this
says that there is a deep influence of the independent variable on the dependent
variable.
Also the other independent variables information quality, Webiste security and
service reliability are having good reliability and covers the rule of thumb criteria.
Thus all the variables are exactly fit for the study and can proceed for further
analysis. Also the reliability test talks positively on the accuracy of the
questionnaire.
4.3. Linear Regression Analysis
Regression analysis is a statistical tool for the investigation of relationships
between variables. Usually, the investigator seeks to ascertain the causal effect of
one variable upon another. It shows the influence of one variable on the other.
To explore such issues, the investigator assembles data on the underlying variables
of interest and employs regression to estimate the quantitative effect of the causal
variables upon the variable that they influence. The investigator also typically
assesses the statistical significance of the estimated relationships, that is, the
degree of confidence that the true relationship is close to the estimated
relationship.
Thus after the linear regression analysis done individually between the dependent
and independent variables it was found that the information quality was having
277
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4.4.Coefficient Model
In multiple regressions the model takes the form of an equation that contains the
coefficient of the independent variables.
From the above table the b value indicates us the individual contribution of the
independent variables on the dependent variable.
The b value also tells us the relationship between the predictor and the outcome.
Thus from the table the following equation is obtained:
Y = a + b1X1 + b2X2 +b3X3 + e
Y = -.850 + 0.526 (Information quality) +
0.346 (website security) +
0.395 (service reliability) +e
From the above estimated equation we can say that all the factors are positively
related with the dependent variable customer retention on e-retailing in Malaysia.
The equation above shows the coefficients of the independent variables. From the
coefficient analysis we can say that the information quality and the website
security play a significant role in enhancing the retention of the customers to adopt
e-retailing and make easy online transactions. From the findings it seems that the
information on the quality of the products and also the transaction information are
very important in order to increase the online purchase increase and marketing by
the producers.
278
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Here we have the R Square value as 0.889, which states that approximately 88.9%
of the dependent variable is influenced by the independent variable. The result
was not able to feel the total gap of the research. Although the results are relevant
to investigate on the dependent variable cannot say that the variables taken for the
research was enough to investigate on the wide topic of customer retention on e-
retailing.
The significant level is also satisfied and acceptable. To confirm that our analysis
is acceptable we also need to see the difference between the R Square and
Adjusted R Square. If there is a wide difference in their value than the model is
not acceptable.
Thus overall the model is fit as it satisfies all the criteria for the model fit in the
regression analysis.
279
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
280
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
adequate navigation functions such as site search engines and clear menus are
critical factors in enhancing the usability of a Web site.
The variables were not enough to indicate the total gap of the research. Thus it is
necessary to analyze the dependent variable in future research with different variables.
References
1) Brandt, R. (1997), Satisfaction studies must measure what a customer wants and
expects, Marketing News, Vol. 31, p. 17. Carmel Herington and Scott Weaven,
281
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
282
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
15) Rust, R.T., and Kannan, P.K. 2003. E-service: A new paradigm for business in the
electronic environment, Communications of the ACM 46(6), 36-42.
16) S. Ba, J. Stallaert, Z. Zhang, 2005, Brand recognition, service quality and price
competition. In: Q. Li and T.-P. Liang (Eds.), Proceedings of the 7th International
Conference on Electronic Commerce (ICEC 2005), Xi'an, China, 2005, pp. 350-354.
17) Santos, J. (2003), E-service quality: a model of virtual service quality dimensions,
Management Service Quality, Vol. 13 No. 3, pp. 233-46.
18) Veneta Andonova, 2003, Differences in the Behavior of Traditional Retailers in
Adopting E-Commerce, Management Research, vol. 1, no. 3, pp. 279290.
19) Zeithaml, V.A., Parasuraman, A. and Malhotra, A. (2002), Service quality delivery
through web sites: a critical review of extant knowledge, Journal of the Academy
of Marketing Science, Vol. 30 No. 4, pp. 362-75.
20) Zhilin Yang, 2004, Online service quality dimensions and their relationships with
satisfaction, International Journal of Service Industry Management, Vol. 15 No. 3,
pp. 302-326
21) Ziqi Liao and Xinping Shi, 2009, Consumer perceptions of internet-based e-
retailing: an empirical research in Hong Kong, Journal of Services Marketing 23/1,
2430
283
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
S
TEM education integrates concepts that are usually taught as separate subjects
in different classes and emphasizes the application of knowledge to real-life
situations. A lesson or unit in a STEM class is typically based around finding
a solution to a real-world problem and tend to emphasize project-based learning [1].
Many STEM lessons involve building models and simulating situations. A good STEM
lesson ensures that students understand the connection to the real world according to
[2]:
- Science: - discover and describe a better understanding of life (What is).
- Technology: - Invent and innovate by improving the natural world.
- Engineering: - control, modify, or design materials, processes, and systems (What
could be).
- Mathematics: - symbolic language for representing reality.
284
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The educational robotics lab provides a unique opportunity for teachers to place
engineering design, scientific processes, technological literacy, and mathematics in
context that students find engaging and understanding.
The Lab. Includes both physical devices, and virtual simulation software that enable
faculty, students, technical staff, and researchers to improve their skills, and update their
knowledge in the direction of innovation and transfer it as educators to indirect impact
to Iraqi high schools.
285
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Assess
Assess data related to goals Create relevant STEM
& adapt plans as needed goals and STEM plan
286
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
287
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
288
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The Arduino platform topics: It is one of the open source H/W and S/W
platform which enables the students to gain skills in electronics components,
electrical components like power supply and motors, sensors, actuators, and S/W
C++ IDE programming skills [7], as shown in FIGURE 6.
289
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
290
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
291
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
292
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. CONCLUSION
The educational robotics lab has a vision for an innovative future that stimulates action
among key stakeholder groups and that helps identify what we know currently, what needs
to be discovered, and what needs to be developed to achieve the ultimate goalcreating
equity of opportunity in STEM to promote lifelong learning among the Iraqi youth.
Certainly, challenges remain, but lessons can be learned and ideas for moving forward can
be developed. In this process of discovery and knowledge propagation, Iraqi universities can
adjust and refine the future of STEM education as new experiences and new evidence are
293
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
gained, particularly about what approaches work best in certain contexts and to serve diverse
learners.
The Educational Robotics lab established to be a prototype for other Iraqi universities to
follow and even it is equipped with simple and open source components, this represents the
importance of engaging in the open source community and enabling the students to build
their own robots from scratch with low cost materials aiming to teach them the STEM
concepts and enhancing their skills and abilities in this important field.
One of the important activities in the lab is the participation in the collaborative online
international learning course in practical robotics with Gannon University and the American
University in Madaba/Jordan. It is the first time of the lab to engage in the course which
introduced also for the first time at Gannon University.
Educational robotics is a pragmatic approach to the technical skills that fall between
disciplines. This will provide a unique opportunity for the universities in Iraq to reform and
modernize the higher education process.
6. REFERENCES
[1] Robert M.Capraro, STEM Project-Based Learning, 2d. ed., SENSE PUBLISHER,
2013.
[2] STEM 2026 A Vision for Innovation in STEM Education, U.S. Department of
Education (the Department), 2016, the report is available on the Departments
website at https://innovation.ed.gov/what-we-do/stem/.
294
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he remarkable growth of traffic volume caused by the exponential increase of the
number of Internet users and continual development of increased bandwidth has led to
a huge capacity of communication system [1] and the creation of various applications
[2]. One of the most well-established communication technologies is fiber optic, which
has easily become indispensable, standing prominently as the mainstay of the modern-day
information infrastructure [3]. The existing infrastructure in high-speed local area networks is
extensively based on the multi-mode fiber (MMF) due to its easy usage, good performance and its
provision of the required bandwidth for a short distance at a more reasonable cost than the
fundamental single-mode fiber (SMF) [4]. In order to meet the expansion in growth of data traffic,
the ability of SMF has been improved consistently last a few decades, and is converging to nonlinear
capacity limit [5]. For managing the future bandwidth predicament, in the last years, mode-division
295
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
multiplexed (MDM) transmission over MMF has garnered in much attention as an intelligent way to
deal with the capacity limits of SMF [6]. This is possible because the capacity of an MDM system
increases relative to the number of modes. In a practical MMF, nonlinear mode coupling is induced
as a result of the fiber manufacturing defects caused by non-circularity of the core, micro-bending,
macro-bending, or twists. Consequently, the signal on each fiber mode propagates down the fiber
with its own distinguished speed signal strength. Modes that take shorter paths arrive at the receiver
earlier than the ones taking longer paths. Mode coupling leads to linear and nonlinear modal
dispersion of the signal or spreading of the optical pulse in time. A short pulse becomes longer and
ultimately joins with the pulse behind, making it less probable for a reliable bit stream for recovery
due to inter-symbol interference (ISI) [7]. To date, compensation for MDM nonlinear channel
impairments, in particular, for de-multiplexing of the output signals and reshaping of the received
channel impulse response, has been realized by utilizing linear equalization strategies such as least
mean square (LMS) and recursive least squares (RLS) algorithms. The linear equalization strategies
are inaccurate considering the nonlinearity of the channel impairments. Accordingly, MDM
equalizers should be developed to be adaptive to time variation and nonlinear characteristics. Based
on nonlinear characteristics of the MDM channel impairments, it is of great interest to adapt the
EFuNN algorithm for nonlinear equalization of the channel impulse response at the receiver. EFuNN
is capable of modelling nonlinear system relationships and has been proven by Kasabov (1999) to be
a very powerful tool when used to data which is comparatively interference, uncertain, and
changeable. EFuNN which has been successfully applied in applications such as, adaptive learning,
knowledge-based systems and for prediction. Many studies have used either neural networks or fuzzy
logic in equalization communication systems. Most of these studies focus on the combination of NN
and fuzzy logic, in designing a system that uses the neural network for a self-learning characteristic.
This increases the data transmission accuracy, whereas, fuzzy logic allows the complexity of the data
to be reduced and it is able to represent knowledge in an interpretable manner for any uncertainty to
be dealt with. The fuzzy neural network evolves over time because of the nature of the constructional
development and the adaptation of the entire evolving connectionist system (ECOS) of which it has
become part. In this research, an equalization scheme for MDM base on EFuNN is developed to
reduce ISI which is caused by mode coupling by reshaping the channel impulse response and
measured the performance of the proposed equalization scheme in MDM based on root mean square
error (RMSE) and CPU-time. Furthermore, to obtain the distorted channel impulse response, an
MDM system over MMF is simulated in OptiSystem in conjunction with its Multimode Component
Library.
2. RELATED WORK
The existing equalization schemes for MDM system are based on several algorithms such as
LMS, RLS, and (RLSCMA).
o Title
N Author Algorithm Summery
MIMO Signal Processing It applies RLSCMA algorithm as the
1.
Zhao et al.
RLSCMA
For MDM With RLSCMA equalization scheme in MDM in FMF. The
(2014)
Algorithm [8]. received signal suffers from mode coupling
and mode delay, unless the limitations are
compensated by multi-input multi-output
296
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
o Title
N
Author Algorithm Summery
substantial research effort has been made for several studies to investigate about the efficient
using of equalization techniques in wireless communication like artificial neural network (ANN),
fuzzy systems and their combinations. They have received attention in the various divisions of
wireless communication. This is because of their ability to mitigate the ISI as well as adaptation to
the nonlinear nature. It motivates the efforts to a potential of applying these techniques to the optical
fiber according to the similarity between them in terms of ISI. The optical system over MMF behaves
similarly with the radio system and shares the multipath nature of transmitted channel. It leads to an
overlap in the transmitted signal, causing random variations of the power of signals propagating in
different modes, which means that the transmitted signal arrives at the receiver in different times.
This phenomenon in a radio system is known as fading and it is called mode coupling in the optical
system over MMF. Both radio and optical systems have the same strategies to manage fading and
mode coupling. One of the techniques is equalization, widely used in radio networks. It can be used
in MDM system, in which RLS and LMS are the conventional algorithms. The aim of conventional
adaptive algorithms based channel equalizers is to reduce or mitigate the effects of ISI, which has
happened in the communication channel. These are gradient-based learning algorithms and hence, its
weights never reach their optimum values because of the mean square error (MSE) being trapped in
local minimum due to the possibility of training mode of the channel equalizer. This means that they
297
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
suffer from long training time, power consumption, and slow convergence. Channel non-linearity,
additive noise, and distortion, are issues that affect the performance of linear equalizer.
One of the robust alternative nonlinear constructions is the evolving fuzzy neural networks,
which offers superior performance than that of linear models due to its capability to represent
nonlinear functions, allowing the use of small number of parameters, is fast and easy trained
equalizer, learn fast from a large amount of data (using fast training), adaptive incrementally in an
online mode, has an open structure, and memorizes information that can be used at a later stage.
FIGURE 2. Channel impulse responses of five channels FIGURE 3. Channel Impulse Response of Five Time-
298
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Results from the MDM system demonstrate that ISI is prevalent due to nonlinear channel effects
from mode coupling and modal dispersion, resulting in each mode at the transmitter to excite fifty-
five modes at end of the MMF and detected by the photodetector. The distorted channel impulse
response of fifty-five modes at the receiver for each channel is shown in FIGURE.2. This will be
used as the input to the EFuNN equalizer. After data collection, two data processing procedures will
be conducted in MATLAB to prepare for the training stage in the EFuNN equalization. These
procedures are:
3.1 Design of Gaussian Reference Signal
In any communication system, the transmitter sends the signals while the receiver detects and
receives the signals. The primary objective at the receiving end is to sample the received signal in a
manner that enhances the probability of reducing ISI. It is vital because real receivers sampling point
cannot be optimal always for every signal since any communication system will contain some
distortions and ISI [12]. The ISI lead to errors in the identified signals and causing information loss
in MDM systems, which is usually caused by the mode coupling. The signals should be-reshaped in
such a way that they avoid interfering each other at the optimal sampling point and should equalize
the input source signals well. FIGURE. 1. shows that the received channel impulse response of all
channels after the MDM system have broadened and overlap with one another due to mode coupling
and modal dispersion. The Gaussian reference signal is used to make some changes in the pulse shape
of the transmitted signals, so that it better suits its purpose for the communication channel, and avoids
ISI in the data transmission typically by limiting the effective bandwidth of the transmission. In this
research, MATLAB is used to simulate the Gaussian reference signal, which is based on Equation 1.
The Gaussian reference signal is described as:
1
e xmu /2 (1) [13]
2 2
2 2
Where sigma is the channel impulse width, mu is the mode at which the channel impulse response
is maximum, x is the mode number.
The performance of an EFuNN equalization scheme is the result of a training process to produce
an approximation as close as possible to the optimal signal with less RMSE and CPU-time. To come
up with a better performance of the equalization scheme, there is a need to design at least 5 Gaussian
reference signals for 5 distorted signals, = 5.5. Each one has a length of 11, adopting the proper
characterization of the Gaussian reference signals, as illustrated in Figure. 3.
3.2 Normalization process of the distorted signal, and the Gaussians reference signal
Normalization process of distorted signal is required because of the equalization scheme link and
learning with sequential and time-varying signals. It consists of a normalization of pre-processed data
to the networks working range from their natural range, therefore the normalized signal is highly
shaped to meet the reference signal of the equalization scheme and are adjusted to the nonlinearities
of the neurons, therefore their outputs should not beyond the capacity bounds. It can be fixed between
0 and 1. Regarding that, this study needs five channels and five Gaussian reference signals. Based
on Equation 2:
xni xi / max xi (2) [41]
Where xi = original level of the channel impulse response
299
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The distorted signals will be inserted along with the Gaussian reference signals after normalization
to implement the EFuNN equalization for MDM. The implementation was executed using MATLAB
R2014a (8.3.0.532) 64-bit (win64). A computer with 8GB memory (RAM) and due CPU core i5
(2.40) GHz has been utilized. Principally, the EFuNN is a five-layer neural network that is able to
incorporate expert knowledge (Kasabov & Woodford, 1999). The structure and parameters are driven
by the input variables. Koprinska and Kasabov (1999) showcase this five-layer structure as seen in
FIGURE. 4.
Principally, the first layer of the network is characterized by the distorted signals and Gaussian
reference signals as input variables. Meanwhile, executives of the fuzzification for the inputs will be
in the second layer. Practically, this layer characterizes fuzzy quantization of the distorted signals and
Gaussian reference signals. During the process of learning, the system creates the (rules / knowledge),
it has learned in the form of if-then rules. In addition, the Membership Function node (MF) is used
in EFuNN to represent the fuzzy values. There are two neurons values represent fuzzy values of
different sizes, in which MF related with these neurons. In this layer, new neurons evolved together
with the input values. If the variable value does not belong to any of the existing MF, it means the
value is more than that of the membership threshold. Therefore, new fuzzy input neuron will be
created through the system by implementing the EFuNN steps. The main task of the fuzzy input nodes
is to transfer the distorted signal and Gaussian reference signal values into membership degrees to
which belong to the MF. The third layer consists of rule nodes that evolve through learning. Evolving
means all nodes in the third layer are created during training. Each one of the rule nodes is defined
by two connection vectors (weights); W1(r) from the fuzzy input layer to rule nodes and W2(r) from
rule nodes to the fuzzy output layer. These nodes represent the prototypes of input and output data
association. In this layer, a linear activation function or a Gaussian function will be used and the
weights will be adjusted. This layer represents the most important layer which determines the number
of rule nodes that will be created in order to make the output equalized signals as close as possible to
the Gaussian reference signals by minimizing the RMSE and lead to reduce ISI from the distorted
signals. The fourth layer is fuzzy output layer where each node is represented the fuzzy quantization
of the output variables. Finally, the output variable layer creates the defuzzification for fuzzy output
equalized signal. The output error (Err = || D D' || / Ni) should be less than an error threshold E,
where D is Gaussian reference signal, D' is shaped by EFuNN output equalized signal, Ni is the
number of outputs and E is the error threshold (tolerance) of the system for fuzzy output.EFuNN
300
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
equalizer parameters either be kept constant during training in equalization scheme, or adjusted
according to the subsequent incoming data. The determination of the network parameters like number
and types of MF for each input variable, sensitivity threshold, error threshold and the learning rates
were determined by the previous experiments. The parameter values for optimal performance have
been used as follows: Initial value for sensitivity threshold (radius of role nodes) S= 0.5, Error
threshold (The level of error tolerance for the output) E= 0.01, Number of membership functions= 5,
Rule extraction thresholds (weight of first layer) W1= 0.5, (weight of second layer) W2= 0.5, and the
consecutive data examples used= 55. The training process involves an iterative modification of the
biases of the network by reducing the (RMSE) of the distorted signals and Gaussian reference signals
in the EFuNN. FIGURE. 5 showcases the training for the five channels. Furthermore, in testing mode
in EFuNN equalization scheme in this research has tested the data EFuNN without Gaussian reference
signal and determined the bias according to the appropriate parameters that are set in the training
mode and was achieved the best desired signal with less ISI. The rules were extracted from the
training stage.
1 n
RMSE
N i 1
( X i Yi )2
(3) [15]
X Y
In Equation (3), N is the number of data input samples, i is the distorted signal, and i is the
Gaussian reference signal. When the CPU-time is, the time taken for both the training and testing
stages of the equalization given pre-inserted distorted and measured channel impulse response
301
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
signals, measured in seconds. After analyzing the results, EFuNN equalization scheme illustrates for
fast adaptive learning and the lower RMSE values via the learning process. To evaluate the
performance of EFuNN equalization scheme, there is a need to compare the EFuNN equalization in
terms of RMSE and CPU-time with previous equalization schemes such as LMS and RLS which
have been used before in MDM system, (detailed in Tables 2 and 3), The goal of the comparison is
to show that the nonlinear equalization scheme can compensate the nonlinear problem of ISI in the
distorted signals in MDM system better than linear equalization schemes.
302
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
REFERENCES
[1] S. R. Abdollahi, H. Al-Raweshidy, and T. Owens, Super-Broadband Wireless Access
Network: INTECH Open Access Publisher, 2012.
[4] P. Prasad, "Investigation of Optical Multi Input Multi Output (OMIMO) transmission link
using Multimode Fiber," THAPAR UNIVERSITY, 1956.
[5] P. J. Winzer, "Scaling Optical Fiber Networks: Challenges and Solutions," Optics and
Photonics News, vol. 26, pp. 28-35, 2015.
[6] S. O. Arik, J. M. Kahn, and K.-P. Ho, "MIMO signal processing for mode-division
multiplexing: An overview of channel models and signal processing architectures," Signal
Processing Magazine, IEEE, vol. 31, pp. 25-34, 2014.
303
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[8] H. Zhao, L. Zhang, B. Liu, Q. Zhang, Y. Wang, Q. Tian, et al., "MIMO signal processing
for mode
[9] S. O. Arik, J. M. Kahn, and K.-P. Ho, "MIMO signal processing for mode-division
multiplexing: An
[10] A. Angela, "Evolving Fuzzy Neural Network Based Load Prediction Model In Dynamic
Cell Sizing,"
[11] K. Raveendranathan, Neuro-fuzzy equalizers for mobile cellular channels: CRC Press,
2013.
[12] P. Agrawal, R. Mehra, and M. Singh, "Implementation cost & performance analysis of
pulse shaping filter," in Green Computing and Internet of Things (ICGCIoT), 2015
International Conference on, 2015, pp. 1168-1172.
[13] A. Kang and V. Sharma, "Pulse Shape Filtering in Wireless Communication-A Critical
Analysis," IJACSA) International Journal of Advanced Computer Science and
Applications, vol. 2, 2011.
[11] S. Nayak, B. Misra, and H. Behera, "Impact of data normalization on stock index
forecasting," Int. J. Comp. Inf. Syst. Ind. Manag. Appl, vol. 6, pp. 357-369, 2014.
[15] R. R. Matlakunta, "Web traffic prediction for online advertising," Auckland University of
Technology, 2011.
304
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
O bject detection is one of the most challenging tasks in computer vision. Recently,
pedestrian detection has become a topic of interest for many researchers [1, 2, 3, 4,
5, 6] because it is widely used in many real world applications such as safe driving
systems, security surveillance, and robotic navigation. A large number of difficulties such as
object appearance make pedestrian detection a challenging task. Different appearances can
305
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
result from different poses and environmental factors such as illumination. Pedestrian
detection becomes an even more challenging task when multiple persons are adjacent to each
other, leading to a bounding box that covers more than one pedestrian. Prior methods of
pedestrian detection can be categorized into two groups: hand-crafted or end-to-end feature
learning systems. For the first type, researchers first proposed different approaches such as
Integral Channel Features [7] and HoG [3] followed by trainable classifiers such as Support
Vector Machine SVM [8, 9], boosted classifiers [10], or random forests [11]. In contrast, a
convolutional neural network (CNN) is an example of an end-to-end feature extraction
system. Recently, CNNs have become a very effective and popular approach for pedestrian
detection [2, 12, 13]. CNNs have been used in variety of machine learning tasks including
image recognition [14,15, 16, 17, 18]. We summarize our contributions as follows: we adapt
contemporary CNN object detection architectures to pedestrian detection. We extensively
analyse and investigate two contemporary CNN architectures: the SPPnet architecture in [19]
and Fast Regions with CNN (F-RCNN) architecture. Our work principally depends on prior
work; however, we comprehensively study the suggested models and carefully choose their
parameters. Consequently, we consider the advantages of some prior existing methods and
propose a unified deep model. We achieve the best current performance on the Caltech-USA,
ETH, and INRIA benchmarks. We not only show that this model outperforms all existing
models but also demonstrate its performance as a real-time pedestrian detector. This
proposed CNN achieves results that are superior to all existing methods. Note that we always
follow the best parameter settings, as investigated in [20] (e.g. methods for generating
proposals such as Squares ChnFtrs, the size of input windows, and so on).
2. RELATED WORK
Because CNNs are used in our study, in this section, we briefly review all deep neural
network models used for pedestrian detection. A very efficient model was proposed in [23]
that achieves particularly good results. This model efficiently joins detection components
such as feature extraction, deformation, occlusion, and the final stage of classification. All
these parts are combined into one unified CNN and trained using back-propagation. The
model presented in [2] essentially focused on using ConvNet (proposed by [27]) with slight
changes, and the model is entirely trained in an unsupervised fashion. The main contribution
of ConvNet [12] is a classifier with hierarchical features. In this case, the classifier is fed
from two successive preceding layers simultaneously. This allows the classifier to use both
local and global features. One interesting work is JointDeep [23], which combines several
learning-stage pedestrian detection models to produce a unified deep model. All the stages
are trained simultaneously as a synergistic system. The system joins four main stages used
in pedestrian detection into one unified CNN: feature extraction, a PDM, occlusion, and
finally classification. A third implementation of the model was demonstrated in [16]. The
authors reviewed prior work and showed the effect of different factors on detection. In
addition, they showed the effect of combining different methods and achieved results that
were superior to previous work. In [15], a pedestrian detection model was proposed called
Switchable Deep Network [15], which achieves state-of-the-art results on the Caltech-USA
dataset with a 37.87% miss rate (MR). The main contribution of this system is the
hierarchical extraction of features. In other words, the model extracts features from different
parts of the body such as the head or shoulder. In [24], two methods to enhance the
performance of a CNN were proposed. The first method is a technique called Random
306
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Dropout. In this method, the authors replaced the conventional Dropout method used by
CNN. Instead of using a fixed rate of dropout, they used a random dropout. Their second
method was named Ensemble Inference Network, which uses several fully connect layers
that each have different network topologies. Both methods were evaluated on the Caltech
Pedestrian Dataset and Daimler Mono datasets, achieving reasonable results. Recently, the
authors of [25] proposed different methods to generate foreground and background windows
to feed a CNN using Aggregated Channel Features. In [26], a multistage deep network
classifier called MultiSDP was proposed. This model has more than one stage of classifier.
Each stage is fed with contextual information. The model requires unsupervised pre-training
to avoid overfitting resulting from the multi-stage classifiers. Finally, the most recent work
of interest was proposed in [20]. The authors introduced a type of ConvNet called a vanilla
network, and performed extensive experiments and tested different parameters that can
influence the performance of a CNN. The authors showed that big ConvNets such as AlexNet
or small ConvNets such as CifarNet can achieve results that are competitive with prior
methods on the widely used Caltech-USA dataset. Although both SpatialPooling+ [21] and
Katamari [22] represent the state-of-the-art, these methods require additional information at
testing and training time, and the vanilla network achieved competitive results. Fig. 1 shows
the results of all abovementioned methods on both the ETH and Caltech-USA datasets. It is
clear that the vanilla network achieves results that are superior to all existing deep learning
methods on the Caltech-USA dataset. In addition, JointDeep [23] surpasses the other
methods on the ETH dataset.
Vanilla networks [20] achieve the state-of-the-art results over all existing deep neural
network approaches. Consequently, in this work, we enhance the performance of ConvNet
[12] and address the weakness inherited from vanilla networks by using a very recent
powerful deep neural network model. Different network architectures are demonstrated to
enhance pedestrian detection performance.
307
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
77
80 70 62.94
70 56.27
58.96 60
60 47.1 48
50 45
50 45
39 37.77 40
40
30
30 22.49 21.6
20 20
10 10
0 0
[39] [101] [104] [105] [106] [100] [107] [39] [101] [104] [106] [100]
In addition, we further show the MR results of all other prior strategies in Fig. 2. Note that
a lower MR is better. Optical flow is used by pedestrian detection strategies as additional
information during training and testing [21, 22].
The CNN state-of-the-art pedestrian detector [20] and most existing models that use CNN
follow the same training procedure, which is similar that of [18], which was originally used
for object detection. The steps for detection can be summarized as follows:
Warp or crop the proposals generated by the first step and feed them into the CNN
because CNNs require a fixed input size, as demonstrated in [18].
Train the CNN using candidate windows.
After training, use the features extracted from one of the last layers of the CNN to train
the SVM, which is used later for classifying extracted features from the last or
preceding layers of the CNN.
Note that the best performance achieved using a CNN follows the procedure above [20]. This
procedure has some drawbacks, as demonstrated in [27]. First, the training and testing phases
are very slow because it is necessary to extract features for both training and testing. Second,
because the input to the CNN is fixed, the model is trained with only a single input image
size [20]. Finally, the systems still have three dependent steps: proposal creation, training the
deep model, and classification using SVM, as shown in Fig. 3. These steps reduce both the
performance and speed. In addition, the CNNs used in [20, 18] accept a fixed image size of
227 227. Therefore, all candidate proposal windows must be cropped before they are fed
to the CNN. To summarize the limitations of the vanilla networks described in
308
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
VJ [9] 0.947337
a b
c
309
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
We endeavor to enhance the performance and overcome the limitations inherent in vanilla
networks. Very efficient and fast deep models proposed in [19, 27] are used, and the potential
parameters that can influence performance are further investigated.
FIGURE 3. Pedestrian detection pipeline: a) multi-scale input images, b) the CNN, and c) final, fully connected layer
and SVM.
It is clear that this model is similar to [20] except for the first stage of multi-scale images.
Note that SPPnet can process whole input images or we can generate candidate proposals. In
this work, we use the second option. The following steps describe Fig. 3.
Step 1. Generated candidate windows. There are a variety of methods for generating
proposal windows. For fair comparison with [20], we followed the
methodsuggested by the authors for generating proposals.
Step 2. The generated category-independent windows are passed into the CNN for
training and testing purposes. Using the robust CNN architecture described by
Krizhevsky et al. [12], 4096-dimensional feature vectors are extracted from the
last layers using Caffe [28]. In contrast to [20], which uses RCNN [18], our CNN
can accept any size of input image because we use the SPPnet architecture [19].
310
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In addition, the need for crop and warp proposal windows is eliminated using the
SPPnet approach [19]. Cropping or warping images is considered one of the main
drawbacks of RCNN because it takes a long time to warp images and loses
information. However, SPPnet can process entire images in a single step.
Step 3. Features are extracted from the CNN layers and the SVM is trained for use later
for testing.
4. EXPERIMENTAL SETUP
The model above was evaluated on three challenge benchmarks, the INRIA, Caltech-
USA, and ETH datasets. The next section briefly describes these datasets. For the
evaluation, we follow the conventions proposed by Dollar and Zitnick. [1].
4.1. CALTECH-USA DATASET
One of the most challenging datasets that we used is the Caltech-USA Pedestrian dataset
[1]. It contains numerous video clips (set00 to set11). The dataset has 250,000 frames.
All image frames are accompanied by annotations. The annotations number 350,000
bounding boxes for 2,300 unique pedestrians. All videos were taken by a driven vehicle. All
images have the same resolution of 640 480 pixels. The image quality is very poor
compared with the INIRA dataset. The general setting for the dataset is that the first six
datasets are used for the training and the other five sets are used for testing. In the standard
setting, sampling is chosen as one of thirty frames in both the training and testing sets.
However, it is possible to increase the training and testing samples by choosing different
numbers of frames to skip. We increased the training and testing sample rate by tenfold, as
described in [20].
4.2. INRIA DATASET
The INRIA dataset [3] contains very high resolution images. However, it is a small dataset
and has some incorrectly labeled images. The dataset has 614 positive frames and 1,218
negative frames for training. In addition, it has 288 negative images and 453 positive images
for testing. Overall, it has around 1,774 pedestrian annotations.
4.3. ETH dataset
In this dataset, all the data frames have a resolution of 640 480 pixels. This dataset has a different
density than the other datasets. We followed the author-recommended setting in [28].
311
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
neural networks. The highest reported result on the Caltech-USA dataset using the
vanilla network is 23.3% MR [20].
FIGURE 4.SPPnet results using multi-scale input images: a) Caltech-USA, b) ETH, and c) INRIA
Using the SPPnet [19] technique without any significant changes, we achieved
accuracies of 22.21%, 40.49%, and 11.1% MR on the Caltech-USA, ETH, and INRIA
datasets, respectively. Note that we significantly outperformed vanilla networks. Thus,
we next investigated a more powerful CNN model called F-RCNN [18] for pedestrian
detection.
6. WEAKNESSES OF SPPNET
Although SPPnet achieves competitive results to the state-of-the-art pedestrian
detection using multi-scale input images, it still has the following shortcomings: 1) we
still need to perform the four training and testing stages described in Section 4 and 2)
fine-tuning can be accomplished only for the last two fully connected layers [27]. Thus,
to alleviate these limitations, a more sophisticated model is used. In this section, we use
the F-RCNN model proposed in [27] for pedestrian detection. As stated earlier, F-RCNN
has a more powerful architecture than all the CNNs mentioned in [18, 19, 20] for the
following reasons:
It is a unified deep model that enfolds more steps in a single CNN and shortens all
four stages of CNN training and testing. For instance, feature extraction, cropping
candidates, and SVM training and testing are all encapsulated in a single unified
CNN. Moreover, it is much faster than all previously mentioned models because
F-RCNN does not extract features and store them in a database; instead, all
proposals are fed into the CNN with the original images so they can project the
proposals into the images. F-RCNN can also propagate error back-to-back, in
contrast to SPPnet, which can propagate error only to the last max-pooling layer.
Therefore, all layers of the CNN are tuneable, which gives it a greater ability to
tune the model for pedestrian detection.
There are more features recognized in F-RCNN than in other models.
Experiments were also conducted on the three pedestrian detection datasets. Again
without any substantial changes, F-RCNN achieved 21.83%, 38.18%, and 10.9% MR
on the Caltech-USA, ETH, and INRIA datasets, respectively as shown in figure 5,6,7.
312
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The results are shown in Fig. 5. Intuitively, F-RCNN is clearly superior to SPPnet. Thus,
we designed a more effective model based on F-RCNN.
313
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
7. CONCLUSION
In this work, we used very efficient and recent methods for pedestrian detection. We
evaluated both SPPnet and F-RCNN, which were originally used for object detection.
We showed that SPPnet performs better than conventional CNNs, which are used in
prior pedestrian detection methods [20]. Using SPPnet without substantial changes, we
achieved better accuracy than the best-designed model using deep neutral networks. In
addition, we accomplished results that are competitive with other models that do not use
CNN. Motivated by the results from SPPnet, we used a leveraging CNN called F-RCNN
that is more efficient than SPPnet. As a result, we outperformed all the prior state-of-
the-art pedestrian detection methods. We also overtook other models that use extra
information during testing and training.
8. REFERENCES
[1] [1] P. Dollar, C. Wojek, B. Schiele, and P. Perona. Pedestrian detection: an
evaluation of the state of the art. TPAMI, 34(4):743761, 2012.
[2] [2] P. Sermanet, K. Kavukcuoglu, S. C. Pedestrian, and Y. Le-Cun.Pedestrian
detection with unsupervised multi-stage feature learning.CVPR, 2013.
[3] [3] N. Dalal and B. Triggs. Histograms of oriented gradients for human
detection.In CVPR, 2005. 1, 2, 5, 7
[4] [4] O. Tuzel, F. Porikli, and P. Meer. Pedestrian detection via classifcation on
riemannian manifolds. IEEE Trans. PAMI, 30(10):17131727, Oct. 2008. 1, 2
[5] [5] C. Mikolajczyk, C. Schmid, and A. Zisserman. Human detection based on a
probabilistic assembly of robust part detectors. In ECCV, 2004.
314
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
315
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[23] [23] W. Ouyang and X. Wang.Joint deep learning for pedestrian detection.In
ICCV, 2013. 2, 4, 5
[24] [24] Hiroshi Fukui Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi,
Hiroshi Murase2 Pedestrian Detection Based on Deep Convolutional Neural
Network with Ensemble Inference Network
[25] [25] Xiaogang Chen, Pengxu Wei, Wei Ke, Qixiang Ye, Jianbin Jiao Pedestrian
Detection with Deep Convolutional Neural Network
[26] [26] X. Zeng, W. Ouyang, and X. Wang.Multi-stage contextual deep learning for
pedestrian detection.In ICCV, 2013. 2
[27] [27] Ross Girshick, Fast R-CNN arXiv preprint arXiv:1504.08083, 2015
[28] Y. Jia, Caffe: An open source convolutional architecture for fast feature
embedding, http://caffe.berkeleyvision.org/, 2013.
316
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
U
NESCO ask the Iraqi ministries of Education and Higher Education to build
educational atlases for the Iraqi Education Systems. The ministry of education
have its own Atlas system but in the Iraqi higher education, there is no such atlas
system. This research is a part from the Atlas system, which we start to build it for the Iraqi
higher education and the first step of the atlas is to complete the system for Baghdad
universities only. UNESCO requirements for this atlas system are big and need huge quantity
of data, but we have fix only some of the required data to start with. The Atlas system need
for a special geographical system to be completed.
A geographic information system (GIS) may be a computer system designed to
capture, save, treatment, analyze, manage, and display all kinds of spatial or geographical
data [1]. Geographic information system (GIS) is a robust tool and has the capability to
handle and treatment spatial data in a massive volume. GIS becomes a common technique
that may produce maps, integrate info, visualize and solve issues, and develop valuable
solutions [2].
Network analysis remains one in all the foremost important and protracted analysis and
application areas in the geographic data system. Networks can perform an alternative datum
317
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
for locations in the context of linear referencing and support a set of tools for the graphical
present. Many network location problems are the most troublesome to solve in terms of their
combinatorial complication. The shortest path analysis is not only one of the major network
operations in GIS analysis, transportation manufacture and many other fields but also the
foundation of other network analysis, such as the most credible path problem, maximum
capacity path problem etc. The shortest path problem is a problem of finding the shortest
path or route from one point to another [3]. In this study describes how network analysis based on
Dijkstra algorithm in ArcGIS can be found
Shortest path for Baghdad universities.
318
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
A. Data Collection
1. Base Map
It is the primary and necessary step towards the completion of the project. For this work,
Bagdad city (332026 N and 442403 E) is taken into account because the study space
that is located within the Iraq. Top sheet of Bagdad city is obtained from the Google earth
application that is taken into account because of the base map for future work(Fig2).
319
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2. Universities Data
The university information will be obtained by visiting the required university and taking
the necessary data concerning with the staff academic, relations, projects, researches and
university ranking. The attribute data like the name of universities, email of universities,
number of colleges, website address etc., can be obtained by visiting the website for each
university. The data needed is in the form of spatial and attribute data. This spatial data is
obtained through the method of digitizing base map of the Bagdad city. The coordinates of
the universities were taken by using Google earth program. For universities spatial data, it
should be connected to the information services provided at every university. Attribute data
that require being saved within the database are universities name, Longitude, and Latitude
as shown in (Table 1).
Table1: University information
B. Geo-referencing
Geo-referencing of base map is an essential stage, as a result of geo-referencing permits
to register base map with respect to the earths surface. Geo-referencing is often done by
choosing the four management points on the corners of the scanned map and inserting that
point by giving acceptable latitude and longitude [1].
C .Mapping of Universities
In this step, the coordinates of the university are taken by collected from Google earth
software.
5. IMPLEMENTATION
The software used to implement this project:
ArcGIS
Dijkstras algorithm
320
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
321
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. EXPERIMENTAL RESULT
6.1. Creation of Map for Universities
geo-referencing for the base map can be created by choosing the four management points
on the corners of the base map and inserted that point by giving acceptable latitude and
longitude, and then inserted the coordinates of the university are taken by collected from
Google earth software as shown in Figure( 3). Finally located road on the map as shown in
figure (4).
322
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
323
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
8.REFERENCES
[1] Dabhade, Amrapali C., and K. V. Kale, GIS Based Health Care Information System for
Aurangabad City. International Journal of Engineering and Innovative Technology, 2014.
4(1).
[2] Bhanumurthy, V., et al. , Route analysis for decision support system in emergency
management through GIS technologies. Int. J. Adv. Eng. Glob. Technol, 2015. 3(2):P. 345-
350.
324
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[3] Zhang, Jiyi, et al. , Shortest path algorithm in GIS network analysis based on Clifford
algebra. Proceedings of The 2nd International Conference on Future Computer and
Communication. Wuhan: Wuhan University. 2010.
[4] Al Obaidy, Abdul Hameed MJ, and Athmar AM Al Mashhadi. Heavy metal
contaminations in urban soil within Baghdad City. JORNAL OF ENVIRONMENTAL
PROTECTION, 2013. 4:72-82
[5] Belcher, Johnny, et al. Bus Routing Algorithms: Application to a Rural School District.
Working Paper No. 27." Appalachian Collaborative Center for Learning, Assessment, and
Instruction in Mathematics (ACCLAIM), Ohio University (2005).
[6] Yomralioglu, T. "Cografi Bilgi Sistemleri Temel Kavramlar ve Uygulamalar
(Geographic Information Systems Basic Concepts and Applications)." Karadeniz Technical
University, Trabzon (2002).
[7] Kai, Ni, Zhang Yao-ting, and Ma Yue-peng. Shortest Path Analysis Based on Dijkstra's
Algorithm in Emergency Response System. Indonesian Journal of Electrical Engineering and
Computer Science, 2014. 12(5):P. 3476-3482.
[8] Winn, Michael T. A Road Network Shortest Path Analysis: Applying Time-varying
Travel-time Costs for Emergency Response Vehicle Routing, Davis County, Utah: a Thesis
Presented to the Department of Humanities and Social Sciences in Candidacy for the Degree
of Master of Science. 2014.
[9] Gupta, Nitin, et al. , Applying Dijkstras Algorithm in Routing Process. International
Journal of New Technology and Research (IJNTR), 2016. 2(5):P.122-124.
325
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
ARTICLE INFO
ABSTRACT
1. INTRODUCTION
I
nternet is used to get quicker transmission of large amount of essential and important
data, because internet contains numeral points of attack, it faces a large number of
attacking types, to avoid unauthorized access this information should be protected,
thus many data protection methods like (Encryption, Watermarking, Masking Data,
etc. ) are done[1]. Protecting digital images has become very important because of the
Internet fastness in the digital world at this time. Protection of digital images drawn a lot of
interest nowadays, and several image encryption techniques suggested to make better safety
of images [2]. Where nobody can read encrypted text without decrypting. The changing
method of the modified data into its native plaintext is defined Decryption, for it can be read
easily [3]. Algorithm of encryption image is divided into three groups [4]:
326
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2. LITERATURE SURVEY
M. A. B. Younes and A. Jantan [5]. Proposed Blowfish forward algorithm depending on
the Selection and choosing of image transformation and a well-defined encryption and
decryption. In their algorithm is divided main image into groups that reconstructed into a
changed image. Blowfish algorithm is used to encrypt transformed image. The correlation
was decreased between image elements by using the suggested method.
Y. Rajput and A, K. Gulve [6]. are suggested method to make better a secure image can
be obtain from the scheme encrypt. The suggested method is classified into 3 steps. Firstly,
the single digit number from the original image calculated if it can be partitioned. Secondly,
bit rotation, reversal & for each block of the image is done. Thirdly, the extended hill cipher
method is used upon an output of second step. The receiver can be generating the original
image if he has suitable decryption key.
A. Gupta, N. Tiwari, M. Chawla and M. Shandilya [7], are introduce image encryption
methods which gather the idea of block based on pixel treatment and transformation. The
suggested technique contains two phases:
1- Block based matrix transformation for pixel place treatment was applied.
2- Applying a bit moving method which alters the data of every pixel.
S. P. Nichat and S. S. Sikchi [8], are introduced a hybrid model for image encryption
gathers chaotic function and genetic algorithm. Their technique is contains two phases:
1- Secure images is built using chaotic function and secret key.
2- Using the result images as seed value for genetic algorithm.
In their suggested way used genetic algorithm to have a better result. The best cipher
image is chosen on finding the correlation entropy and coefficient. Also the best cipher image
in case of having highest entropy and lowest correlation coefficient.
3. Proposed Method
The proposed Image Encryption Based on Partitioning and Rearranged Pixels Position
(IEBPRPP) method is suggested to protect information of colored image by rearranging the
distribution of image pixels. The framework of IEBPRPP method is classified into two parts;
image encryption and image decryption as it will be shown below:
A- Encryption Part
The IEBPRPP method is illustrated in Fig.1. First step includes entering cover image
(RGB) used in the IEBPRPP method. Second step: partitioning the cover image into four
equal parts, and then converting the pixels value of each part into new 1-D array.
327
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Generate
Random Seed value
Register1= high
Number Register2= width
Register3= image size
Count= 0
Count = count +1
No
Count = part_size
Yes
Reorder Using random number to
Pixels reorder pixel position
Position
Count = count -1
No
Count = 0
Yes
Save image
FIGURE1. Proposed method outline (Encryption Stage)
Third step, is generate a set of random numbers by using LFSR. The length of
sequence bits that will be generated by using LFSR and then convert it to random number
depending on the size of any part of cover image (part image =(high/2)*(width/2)) therefore
this length will be changed with each cover image that has a new size. LFSR consists of three
registers that have different primary lengths (29, 31, 37) respectively with different
connecting function. Initial values of registers based on the original image (height, width and
size of image). These numbers are stored in a new 1-D array where the size is equal to any
part of sub square partition see Fig.2.
328
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Random
No.
4
1
3
:
:
Each number indicates the pixel location that will be called from the four respectively
to be rearranged in a new array, whose size is equal to the size of the main image see fig. 3.
Fourth step, after the rearrangement of all the pixels complete the result image will be
converting to another color space (YCbCr) and then the result represent encrypted image.
Random
No. P1 P2 P3 P4 Image Encryption
No.
4 1 120 33 231 210 144 167 150 188 120 33
1 2 200 123 220 213 231 210 136 52
3 3 136 52 158 240
5 4 144 167 150 188
2 5 80 189 158 160
B- Decryption Part
Decryption part of IEBPRPP method is consists of four steps: First step: input the
encrypted image (YCbCr). Second step: conversion the encrypted image from YCbCR to
RGB color space. Third step: constructing 2-D array to store the pixels value of encrypted
image. Fourth step: using the same initial values in encryption side to produce random
numbers. Then reconstructing four equal arrays their sizes are equal to quarter part of the
whole image. Relying upon the random numbers, the pixels are rearranged into their original
positions in the four arrays. Finally the image has been reconstructed from the four parts that
were obtained, see fig.4.
329
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Save image
4. Experimental Results
The proposed method is implemented on color images. Figs. (5 and 6) are illustrated the
result of IEBPRPP method (encrypted and decrypted). The result of the images are analyzed
the performance by using some types of visual observation.
330
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
331
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
A- Red color before encrypted B- Green color before encrypted C- Blue color before encrypted
1- Add noise
2- Cut of part of the information
In IEBPRPP method, the way of adding noise or cutting parts of the image, do not affect
the clarity of the image because this noise will be distributed randomly on the image after
the decryption process. This noise can be removed by using medium filter. Fig.8 illustrates
adding noise and cropping parts of encryption image and the result after its decryption.
332
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. Conclusions
A new suggested IEBPRPP method is introduced to protect the information in color
images in this paper. This method depends on fragmentation the image into four parts and
rearranging pixels position through generated random numbers by using LFSRs. The initial
values are taken from image data which cannot be changed if exposed for compression
process. The numbers of random numbers that are generated represent 1/4 of the size of the
image. One of the benefits of this method the result image can be sent to the receiver with
JPEG form and the receiver can recover the original image. Another benefit is not sending
any additional information with the encrypted image.
REFRENCES
[1] J. Shah, and Dr. V. Saxena Performance Study on Image Encryption Schemes" , IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011, p 349-
355
[2] V. V. Divya, S. K. Sudha, and V. R. Resmy "Simple and Secure Image Encryption",
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November
2012, p 286- 289
[3] R. Pakshwar, V. K. Trivedi, and V. Richhariya " A Survey On Different Image
Encryption and Decryption Techniques", IJCSIT International Journal of Computer
Science and Information Technologies, Vol. 4 (1) , 2013, p 113 116
[4] K. D. Patel, and S. Belani " Image Encryption Using Different Techniques: A Review ",
International Journal of Emerging Technology and Advanced Engineering , Volume 1,
Issue 1, November 2011, p 30-34
[5] M. A. B. Younes, and A. Jantan "Image Encryption Using Block-Based Transformation
Algorithm", IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03,
(Advance online publication: 19 February 2008
333
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[6] Y. Rajput and A K. Gulve " An Improved Cryptographic Technique to Encrypt Images
using Extended Hill Cipher", International Journal of Computer Applications, Volume 83
No 13, December 2013, p 4-8.
[7] A. Gupta, N. Tiwari, M. Chawla and M. Shandilya " An Image Encryption using Block
based Transformation and Bit Rotation Technique", International Journal of Computer
Applications, Volume 98 No.6, July 2014, p 30-32.
[8] S. P. Nichat, and Prof. Mrs. S. S. Sikchi " Image Encryption using Hybrid Genetic
Algorithm", International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 3, Issue 1, January 2013, p 427- 431.
[9] T. Sivakumar, and R. Venkatesan " Image Encryption Based on Pixel Shuffling and
Random Key Stream", International Journal of Computer and Information Technology,
Volume 03 Issue 06, November 2014, p 1468- 1476.
[10] G. A. Sathishkumar and K. B. Bagan, A novel image encryption algorithm using pixel
shuffling and BASE 64 encoding based chaotic block cipher, WSEAS Transactions on
Computers, Vol. 10, No. 6, pp169-178, 2011.
[11] K. Loukhaoukha, J.Y. Chouinard, and A. Berdai, A secure image encryption algorithm
based on Rubik's cube principle, Journal of Electrical and Computer Engineering, Vol.
20, No. 12, pp113, 2011.
[12] C. K. Huang, C. W. Liao, S. L. Hsu, and Y. C. Jeng, Implementation of gray image
encryption with pixel shuffling and gray-level encryption by single chaotic system,
Telecommunication Systems, Vol. 52, pp563 571, 2013.
334
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Image Enhancement
By Using Homomorphic Filtering Model
Assist.Prof. Amel H.Abbas
Computer Science Dept., College of Science, AL-Mustansiriyah University - Iraq
Dr_amal2006@yahoo.com
Prof.Dr.Jamila Harbi S.
Computer Science Dept., College of Science, AL-Mustansiriyah University - Iraq
Dr.jameelahharbi@uomustansiriyah.edu.iq
1. INTRODUCTION
I Image enhancement is used when the image has a degradation of natural look
and the contrast is higher. The contrast enhancement is a widely using image
enhancement technique. The difference between contrast of color image and the
brightness makes an object in the scene distinguishable. The brightness is the feature of
vision that defines how much light the source reflects makes the source appears to be
reflecting the light. But the brightness and the lightness are two different aspects [1]. The
contrast can also be defined as the amount of color or the grey scale differentiation value that
exists between various images. Many algorithms, such as the Retinex based algorithms [2],
the unsharp masking algorithms [3], and the histogram equalization (HE) algorithms [4], etc.,
are proposed to enhance the image brightness. These algorithms are focused on detail
enhancement, but the result of these algorithms is given unnatural looks, caused by light
source confusion and artifacts. Therefore others attempt to reduce over-enhancement at the
cost of the details [5]. A strong correlation with reflectance and the amount of visible light
335
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Where: f(x,y) is an optical image, and i(x,y)&r(x,y) are the illumination and reflectance
components.
As previously said the reflectance component is means the features of the object
itself. Therefore we more interest with reflectance than illumination component. Eq.1can is
converted into linear model by using the log operation such as:
(, ) = (, ) + (, ) . (2)
Form Eq,2 can be easy to process in frequency domain, because the illumination component
lies in low frequency band and reflectance in high frequency band. Discrete Fourier
transform (DFT) is applied on eq.2, and then high pass filter is used to enhance reflectance
part and degrade the other. After enhancing done the inverse DFT (IDFT) is used to
reconstruct the original image after exponential operation is used to convert the illumination-
reflectance original space. All these process called Homomorphic filter is shown in Fig.1.
336
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
.
FIGURE 1: Homomorphic filter steps
In the real world the corrupted images are expected to be the way the image that is corrupted
by this type of non-uniform illumination. The corrupted image under investigation is as
shown in Fig.2. Also Fig.2 showed the original color image and the converted gray scale
image. The aim of the paper is to use homomorphic filter out the illumination component to
enhance the original image.
(a)
337
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
(b)
FIGURE 2: original non-uniform illumination image, a) color image and b) gray scale image
Fig.3 illustrated the brightness distribution by drawing histogram in 3-D of the original
images.
(a) (b) (c )
(a)
(b)
PSNR=10.72dB and SNR = 2.51dB
FIGURE.4: Image2 enhancement by using equalization histogram: a) image2 and its histogram before
enhancing the brightness, and b) image2 and its histogram after enhancing the brightness
338
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The experimental result is demonstrated in Fig.5. RMSE value is 65.57, MSE= 4299.6,
PSNR = 11.83dB, Pearson Correlation Coefficient between original image and enhance
image (PCC1) value is 38320.85 and Pearson Correlation Coefficient between original image
and original image (PCC2) value is 39203.
Fig.6 is shown the modification of the brightness distribution by using homomorphic filtering
model.
If we use the output image of Fig.5 as input to the enhancement model, therefore we obtain
the more enhance image as shown in Fig.7. RMSE value is 45.998, PCC1 value is 37897.38
and PCC2 value is 39203.
(a) (b)
FIGURE 7: Modify homomorphic filtering: a) first applied enhancement, and b) second enhancement.
Figs.8, 9, &10 are shown the real enhancement by using homomorphic filtering model. In
Fig.8 the results values are: RMSE = 59.302, MSE = 6154.83, PSNR = 9.77dB,
339
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
(a) (b)
FIGURE 10: Modify homomorphic filtering: a) first applied enhancement, and b) second enhancement
Figs.11, 12, &13 are shown the real image3 enhancement by using homomorphic filtering
model. In Fig.11 the results values are: RMSE = 42.60, MSE = 1717.61, PSNR = 15.35dB,
PCC1= 66184.02, PCC2=72899.
Fig.12 showing the histogram graph of each steps of homomorphic filtering model. Fig.13 is
illustrating the output of Fig.8 used as input of Fig.9 and the values of image fidelity are:
RMSE = 132.59, PCC1= 70035.66, PCC2= 72899.
340
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
FIGURE 11: Homomorphic filtering applied on Image3, and the reconstructed image .
(a) (b)
FIGURE 13: Modify homomorphic filtering: a) first applied enhancement, and b) second enhancement
4. CONCLUSIONS
The proposed modification model is enhanced the illuminate component of the non-
uniform brightness images that collected from the output LASER experiment. The
brightness is modified the brightness in high frequency and in low frequency therefore, we
improved the results by using homomorphic filtering two times and we get acceptable
results of some fidelity parameters.
5. REFERENCES
341
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
342
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
343
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
machine tools selection, jig and fixture, cutting conditions, and machining sequences. Based
on the information provided by CAD and CAPP, the Computer Aided Machining (CAM) is
carried out to generate the tool paths. The generated tool paths are coded with a special
programming language standard (ISO 6983-1) which is known as G-code [2]. G-code
contains information that guides the motors of the system and sets some parameters of the
CNC control system. CAM software can generate a wide range of G-code extensions based
on the type and manufacturer of the CNC machine. Generally, the CNC system composed of
Man Machine Interface (MMI) unit, Numerical Control Kernel (NCK) motors and drivers
unit.
MMI: composed of a Graphical User Interface (GUI) application that offers the interface
between the motion controller and the user. It provides the facilities for the user to load the
part program, display the machine coordinates and tool paths, and a command line to send
single instructions to the motion controller.
NCK: the part that is responsible for reading the G-code lines, extracts the motion
commands, determine the tool paths, and position control the motors by delivering the motors
driver units with appropriate signals.
Motors and drivers unit: Includes servomotors or stepper motors and their respective
drivers.
Figure 1 shows a typical CNC structure with labels for the key components. It also
indicates the 3 axes of movement (X, Y and Z). This is an example of a simple category of
the available CNCs. There are tremendous numbers of configurations that differs in the
number of supported axes of movements, sizes, and other machining features.
2. SYSTRM DESCRIPTION
2.1. STRUCTURE
Figure 2 (a) shows the hardware of the designed CNC. In this work, the three primary
linear axes X, Y, and Z are considered.
A ball screw shown in Figure 2 (b), which is a lead screw operated by a ball bearing, takes
the role of converting the rotation of the motor to linear movement. It also determines the
Basic Length Unit (BLU) of the machine tool. Here, three ball screws are coupled with each
of the three stepper motors shafts using a plastic tube to reduce the sensitivity to misaligned
rotation centers.
344
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In order to increase the linear movement accuracy and smoothness, aluminum drawer
slides shown in Figure 3 (a), have been proposed as the linear movement guide of the table
(Y), the gantry (X) and the spindle (Z).
The work area of the machine is 30x20 cm, and various options of light weight drills or
low watts laser diodes can be used as cutting tools.
FIGURE 3. (a) Drawer Slide (left), (b) Stepper motor coupling with slide (right)
345
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2.2. MOTORS
Generally, CNC machines movements can be accomplished through the usage of stepper
motors or servomotors. The control system is of open loop type when stepper motors are
used. While in the case of servomotors, the control system would be a closed loop system.
Servomotors work in a closed loop setting where they continuously receive feedback
signals forms the encoders. These signals dictate the current position and check whether the
control signals executed properly. This setting gives the servomotors advantage over stepper
motors in that there is no possible way of losing steps. In addition, servomotors offer high
torque and speeds.
Stepper motors are DC motors move in discrete steps. Very precious speed and
positioning control can be obtained using stepper motors. They are good for low speed/high
precision applications, but their torque is less at high speeds. Stepper motors do not have
position feedback. They operate in open loop control system. Figure 3 (b) illustrates the
coupling of the stepper motor shaft with the ball bearing screw.
In this work, the used stepper motors are of size NEMA-17 and operated by 12 volt DC
power supply.
346
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
commands that are related to the coolant system and spindle control.
347
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
348
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
A CNC shield has been utilized to simplify the wiring of the system. CNC shield as shown
in Figure 9 is a breakout board that has been designed specifically to work with Grbl CNCs.
It has four sockets that are compatible with A4988 driver, which provides the ability to drive
4 stepper motors, namely, X, Y, and Z, plus one auxiliary motor. It also has additional
connectors that facilitate the connection of limit sensors and control buttons.
3. PRACTICAL RESULTS
A designed part using 3DMAX, which is CAD software, is shown in Figure 10. This
design is saved as a 2D vector file. This file is opened with Aspire, which is CAD/CAM
349
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
software, to create accurate and efficient toolpaths to cut the designed shape, as indicated in
Figure 11.
FIGURE 10. A 2D design using Aspire. FIGURE 11. Tool paths generation with Aspire
The final product after cutting using a laser diode attached to the machine spindle is shown
in Figure 12.
In this paper, a light duty 3-axis CNC machine structure and control system have been
discussed. The machine has been built using wood, drawer sliders and ball screws. Three
stepper motors have been used to move the axes of the machine in the X, Y, and Z directions.
The core control of the CNC is achieved by utilizing the considerable features of Grbl v1.1.
The system has been tested to draw different shapes designed with CAD software (3D
MAX). CAD and CAM software are embedded in current available programs such as Aspire.
This program offers the facilities to design the parts and generate the tool paths based on the
available profiling options. The generated tool path file, which is called G-code, is loaded to
Grbl through serial communication with a Grbl Controller application running on a personal
350
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
computer. The constructed machine can be utilized in drawing, laser engraving and carving
on several types of material such as wood and plastic. This gives the ability to invest this
machine in producing numbers of products that could be marketed for small business
projects.
Through utilizing the advanced technology of System on Chips (SoC), the CNC control
system can be integrated in a single chip. Integrated control system of CNC omits the need
for external PC and provides more portability and speeds processing of the system.
5. REFERENCES
[1] S.-H. Suh and S.-K. Kang, Theory and Design of CNC Systems, Springer, 2008.
[2] T. R. Kramer, F. M. Proctor and E. Messina, "The NIST RS274NGC Interpreter -
Version 3," NISTIR 6556, 2000.
[3] Allegro Microsystems, "DMOS Microstepping Driver with Translator", A4988
datasheet, Rev. 5.
[4] Roland DG Corporation, NC Code Reference Manual, Roland DG Corporation,
2009.
[5] "Grbl Wiki," [Online]. Available: https://github.com/gnea/grbl.
[6] D. V. Can, N. Q. Dich and N. P. Quang, "Proposed Structure Hardware of the CNC
for Machine Tools Based on System on," in The 2nd International Conference on
Control, Automation and Robotics, 2016.
[7] A. Albert, Understanding CNC Routers, vol. I, FP Innovations.
[8] J. Bi, T. Yu and Q. Li, "I2NC: A New Type of Computer Numerical Control," in
Proceedings of the 2006 IEEE International Conference on Mechatronics and
Automation, June 25 - 28, 2006, Luoyang, China, 2006.
351
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
M
ost of the complex control problems cannot be solved by using conventional
techniques. Modern intelligent tools are adopted to simplify these complex
problems and design more robust controllers using what is known as a
Computational Intelligence (CI) [1].
During the last few decades, many researches have studied and applied different Artificial
Intelligence (AI) techniques as the most popular methods in Heuristic optimization
techniques. There is a growing interest in using AI tools in various fields electrical power
and power generation plants such as using the AI techniques to design a hybrid control
systems which integrate the conventional (mathematical approaches) together the intelligent
tools in controlling the performance of different electrical power systems. [2, 3]
352
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
There are many AI techniques that aimed to compute the optimal or near optimal solutions
for different optimization problems such as: Artificial Neural Network (ANN), expert
system (ES), Evolutionary Computation (EC), Genetic Algorithms (GA), Particle Swarm
Optimization (PSO), Ant colony Optimization, Fuzzy logic and others. Many of these
techniques are used to find the optimal working parameters of power control systems,
excitation systems and power system stabilizer (PSS) [4-7].
353
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Mutation: is used to avoid a deadlock or falling in a local minimum point which might
lead a non-accurate solution. The importance of this operation is extracted to maintain variety
in population through performing a gene or bit-wise process.
The below diagram illustrates the whole cycle of the GA operation:
T=0
Initialize Evaluate
start
population Solutions
Is optimum Yes
solution Stop
(Fitness)?
NO
G
T=T+1 A Selection
o
p
e Crossover
r
a
t
o Mutation
r
354
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In this work, the first order Sugeno system with two fuzzy IF-THEN rule has been
implemented as follows: [12, 13].
Rule 1: if x is A1 and y is B1 then f1= p1x+q1y+r1
Rule 2: if x is A2 and y is B2 then f2= p2x+q2y+r2 (3)
Where: A1, A2, B1, B2, are membership functions for inputs (x, y), and (p1,q1,r1) ,
(p2,q2,r2)are the parameters of output functions. The architecture of ANFIS can be
represented as shown in figure (2).
The partitioning of inputoutput space is a technique used to form and visualize the
mapping relation of fuzzy rules and explain how the fuzzy rules are related to the input space.
The structure and the number of fuzzy rules are inuenced by the partitioning techniques.
The most common partitioning method is grid-type partitioning and clustering. Figures 3 and
4 illustrate the input-output space partitioning[14].
355
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
356
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
357
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
TABLE 1.
Genetic algorithm variables for case study
Mutation Rate, % 0.8
Number Of Variables 13
Precision 20
358
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
c
FIGURE. 6. Simulation of power station with GA for three situations: (a) exciter voltage
vf, (b) speed of rotor, m, (c) the load angle delta ( )
359
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
(a)
(b)
(c)
FIGURE. 8. Simulation of power station with ANFIS for three situations :( (a) Exciter
voltage vf, (b) speed of rotor, m, (c) the load angle delta ( )
360
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. REFERENCES
[1] Michael S. Bittermann," Artificial Intelligence (AI) versus Computational Intelligence
(CI) for treatment of complexity in design," Design Computing and Cognition
DCC10. J.S Gero (ed), Springer, 2010.
[2] A. Konar, Computational Intelligence: Principles, Techniques and Applications,
Springer, 2005.
361
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[8] Rahul Malhotra, Narinder Singh, and Yaduvir Singh, Genetic Algorithms: Concepts,
Design for Optimization of Process Controllers, Computer and Information Science,
Vol. 4, No. 2; March 2011.
[9] David A Coley, An Introduction to Genetic Algorithms for Scientists and Engineers,
World Scientific Publishing Co. Pte. Ltd, 1999.
[10] Ulrich Bodenhofer, Genetic Algorithms: Theory and Applications, 3d. ed, Lecture
Notes, Winter 2004 (www.flll.jku.at).
[11] Michael Negnevitsky, Articial Intelligence A Guide to Intelligent Systems, 2d. ed.,
Addison-Wesley, Pearson Education, 2006.
[12] Jyh-Shing Roger Jang , Chuen-Tsai Sun, & Eiji Mizutani, Neuro-Fuzzy and Soft
Computing A Computational Approach to Learning and Machine Intelligence,
Prentice-Hall, Inc, 1997.
[13] Fakhreddine O. K., Clarence de Silva, Soft Computing and Intelligent Systems design:
Theory, Tools and Application, Addison Wesley, Prentice-Hall, 2004.
[14] Werner Dubitzky, Data Mining Techniques in Grid Computing Environments, John
Wiley & Sons, Ltd.,2008.
[15] Ibrahim Hamarash, "Small Signal Stability Analysis of Kurdistan Regional Power
System", [on line], http:// www.researchgate.net/publication/268745758.
362
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he IoT is a field that consists of the newest technologies make a revolution of
Internet. It includes a wide range of applications such as smart cities, e-health,
smart home, smart grid and where it monitors smart road, smart waste and patients
in real time [1]. The term "things" consists of interconnected smart devices like
sensors and actuators. These devices are communicating with each other, referred to as
Machine to Machine communication (M2M) [2]. With the rapid growth of the Internet, Cisco
estimates that the world will have 50 billion of IoT devices within the next 20 years. Also,
these devices have sensing feature such as temperature sensor in order to measure Room
temperature [3]. Thus, a large number of data needs to be stored on servers. This will lead to
363
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
integration of IoT and Cloud Computing, which Cloud offers services, tools and software to
end users [4].
The phrase of " Internet of Things" was created by Kevien Ashton on supply-chain
management where he was cofounder and executive director of the MIT Auto-ID Center. He
said regarding to IoT: "I could be wrong, but I'm fairly sure the phrase "Internet of Things"
started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999. Linking
the new idea of RFID in P&G's supply chain to the then-red-hot topic of the Internet was
more than just a good way to get executive attention. It summed up an important insight
which is still often misunderstood."[5]. After years, it was introduced by David L. Brock in
2001. The "thing" is a part of people`s life to interact within the physical world that surrounds
us. The phrase " Auto-ID" includes any identification technology such as bar codes and smart
cards that are used for reducing errors, automating, and increasing efficiency. In 2003, Radio-
Frequency Identification (RFID) application expanded into wider fields at the MIT`s Auto-
ID center, which built the basis for the current IoT sight [6].
People have an addiction to purchase multiple devices, (I Pads, mobile handsets, Tablets,
Laptops, etc.) therefore, the number of devices have been increased and is expected to exceed
the number of people [7]. Data that are extracted from these devices have an impact on
society and economy. Thus, IoT is easy to monitor operations and manage them far away
from organization, track data as it moves from one place to another and even if it crosses the
ocean and detect the changes in the human body like temperature and heartbeat that could
save lives [8]. IoT includes essential types of networks like distributed, grid, ubiquitous, and
vehicular; these have turned towards the world of IT with the five coming years [9].
The original Internet was formed its architecture before the explosion of huge and smaller
devices such as sensors/actuators. With the emergence of IoT, it destroys all previous ideas
regarding network architecture. Thus, create challenges for the current networking paradigm
[10]. IoT develops the enormous applications which makes use of data generated from
different objects that interact and cooperate with each other to provide better services to
governments, organizations and humans.
The rest of this paper is organized as follows: Section 2, discusses the architecture of IoT.
Section 3, presents protocols and standards involved in IoT and their challenges. Section 4,
classifies the most important microcontrollers. Section 5, introduces the integration between
cloud and IoT paradigm. Section 7, focuses anda derives the open issues in Cloud of
Everthing.
2. IOT ARCHITECTURE
The IoT handles billions of different objects that integrate and corporate with each other
to provide the scalability, configuration and modularity of IoT deployments in different
fields, therefore, the layered architecture has taken into consider. It depends on various kinds
of technologies supporting the IoT and describes how these technologies related to each
other. The basic IoT layers consists of three model [11] are: Application, Network, and
Perception Layers. new layers are added [12]: Business and Middleware Layers are recently
proposed.
364
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
365
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
3. PROTOCOLS
In this section, an overview is provided of the most common protocols specified for IoT,
by giving their functionalities and their challenges.
366
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
MQTT is better than the HTTP protocol because it has a lower overhead, a synchronous
and reliable with different levels of quality of services used for reliable networks. QoS level
0, the client receives the message at most once, an acknowledgement not used in this level,
and the server does not retry sending the message at all. QoS level 1; the server delivers a
message to the client at least once, here an acknowledgement used in this level. QoS level 2,
this level is used when lost or duplicated of the message that is accepted by the client, this
requires 4-way handshake to deliver the message at exactly once, hence this coz increase in
the overhead [16].
367
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
unsuitable for constrained devices because it does not support multicast, which is the
important role in CoAP [22]. Some researchers have proposed some solutions to that problem
[23].
There are many challenges that CoAP that may face, some of them are mentioned:
Congestion control: CoAP runs on the top of UDP protocol, UDP does not
provide reliable or congestion control mechanism, therefore, CoAP must deal with the
congestion control mechanism by itself. It has a basic mechanism and it is achieved by
"Confirmable" and "NON Confirmable" messages. However, this mechanism could
not be handled with constrained resources. Some researchers have proposed some
solution to that problem [24].
Size of MTU: constrained environments have very small size of MTU. The
frame size of IEEE 802.15.4 is 127 bytes as a maximum, while the size of MTU of
IPv6 is 1,280 bytes as a minimum, but the IP network supports MTU 1500 byte or
higher. 6LowPAN provides an adoption layer between the link layer and the network
layer to provide fragmentation method and header compression to recover the above
problem. Some researchers have proposed some solution to that problem [25].
MQTT CoAP
Messaging Multipoint-to- Point-to-Point
transformation Multipoint communication
commination
Topics URI
Transport TCP-Based UDP-Based
Architecture Publish/Subscribe Request/Response
model model
Layers Single layered Two sublayer:
Request/Response
and Transaction
Security SSL/TLS SSL/DTLS
Reliability 3 QoS levels 4 QoS levels
Performance Lower delays Lower overhead and
analysis lower packet loss
368
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
to other nodes) and multipoint-to-point (transfer traffic from nodes to root) [26]. For the
above reasons, LLNs must have specific routing requirements. The previous routing
protocols were like OSPF, IS-IS, AVOD and OSLR but all these protocols did not meet LLN
routing requirements. IETF forms a new Working Group to meet LLN solutions. The
Routing Over Low power and Lossy (ROLL) proposed an RPL routing protocol for various
application scenarios like healthcare, industrial, urban, smart home, smart cities and for
WSNs and IoT. RPL was standardized in 2011 and defined as RFC6650. RPL is committed
to IPv6-based to prevent fragmentation and intends to support a different kinds of link layer.
RPL supports various technologies such as Wi Fi and IEEE 802.15.4 [27]. RPL routing has
two attributes that are used for path calculation: the first attribute is constraints, the node and
link clipped from the path that did not commit the constraint; the second attribute is metrics
that determine the least-cost path [28].
Objective Function uses metrics and constraints to determine the best path [29]. RPL
mechanism is based on Directed Acyclic Graphs (DAGs) which consists of Destination
Oriented Directed Acyclic Graphs (DODAGs). DODAGs have one root that is called LBR
(LowPAN Border Router) or it can have a multiple root in the network. In addition, they
have a preferred parent node in which each router can selects its parent. Furthermore, they
have a several sink routers that are called a leaf node. The DODAG root advertises the routing
metrics and filters the link to look as if it fulfills the properties [30].
RPL supports new messages of Internet Control Message Protocol (ICMPv6) for the IPv6
specification to exchange related information [31]. These messages are DIO (DODAG
Information Object), DIS (DODAG Information Solicitation) and DAO (DODAG
Information Object). RPL uses Trickle algorithms to exchange messages dynamically
between nodes. [50]. The DIO message is used to advertise the table of neighboring nodes
of the graph, determine distance from each node to the root based on certain rules (objective
function, DAG characteristics, advertised path cost and local policy), and to make a decision
whatever the node is to join the network or not. The DAO message is used to advertise the
upward traffic and downward traffic. The DIO message is used by a node to collect DIO
messages from neighboring nodes.
3.3. IPv6
IPv6 was created by the IETF and defined as RFC-791. It is considered as an interactive
of IPV4. It is similar to IPv4, but adds some additional features such as the length of IP
address is longer than IPv4 and it is extended from 32bit into 64bit. IPv6 becomes the future
of IoT.
The following aspects of IPv6 make it suitable to be used by IoT:
The IP is a requirement to any connection that is used to transfer data between devices
over the internet.
It offers scalability by providing 2^128 unique address space which covers all old and
future devices.
It supports the Network Address Translation (NAT) which enables multiple users to
share the same public IP address that solves the limitation on IPv4 problem.
It provides solutions to support mobility of end-to-end devices and routing mobility of
the network.
369
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
It provides the stateless mechanism, in another word the nodes can define their address
and hence reduce the cost and configuration effort.
If the number of devices is increased, then a security issue is considered, such as network
attack. For example; in the case of smart house, there will be a security risk on information,
therefore IPv6 provides security such as IPSec and VPN (Virtual Private Network) where
the last is supported by all compatible devices.
ISP (Internet Service Provider) may suffer from a problem, when the network is not
supporting IPv6. Some researchers have proposed some solutions to that problem [32].
3.4. IEEE802.15.4
The IEEE802.15.4 is an IETF standardized protocol for constrained devices such as
sensors/actuators, designed for power consumption, low data rate, low cost, low complexity
and a few meters of radio frequency; specified for low-rate wireless personal area networks
(LR-WPANs), IoT and M2M. It designates a physical layer and Medium Access Control
(MAC) sublayer [33]. IEEE802.15.4 supports two types of devices: a full-function device
(FFD) and a reduced-function device (RFD). The FFD device serves as a personal area
network (PAN) coordinator or just a coordinator. On the other hand, the RFD cannot serve
as PAN coordinator or just a coordinator. The RFD is designed for simple node like a switch
or a passive infrared sensor with limited resources and memory. The network has at least one
FFD and multiple RFD which can communicate with each other. IEEE802.15.4 consists of
two types of topologies and operates one of them: the star topology or the peer to peer
topology (or called mesh). The star topology contains of one central FFD and some RFD
devices. The FFDs control, initiate, terminate and manage the other RFD devices. The star
topology offers services in the fields such as smart home, healthcare and computers. While
the mesh topology contains one FFD coordinator and multiple RFD devices which can
communicate with each other through intermediate nodes. The mesh topology is more
complex than star topology. It supports applications like WSN and industrial. Cluster tree
topology is extended from mesh; the most devices are FFD. The other devices from outside
the network cannot associate with cluster tree due to RFD devices at the end of the cluster
[34].
There are other protocols developed to support IEEE802.15.4 such as ZigBee, WiFi and
WirelessHART [35].
4. MICROCONTROLLER
In this section, we consider the microcontroller as one of the most important and
fundamental elements of IoT, by giving the main types used by researchers, where the
selection of microcontrollers depends on many factors to choose the suitable one for a project
for example, processing speed, energy computation and the supported programming
languages, also we mention some important characteristics for micro-controllers, with
comparison between some important versions which related to micro-controllers and to make
the selection and learning easier. Also, some simulators programs which are available are
mentioned with books.
370
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4.1. Arduino
Arduino is an open-source microcontroller used by teachers and students to prototype a
powerful, low cost and flexible electronic project. Arduino consists of hardware and software
that is called IDE (Integrated Development Environments). It takes input from different
sensors like light, temperature, degree of flex, pressure, proximity, acceleration, carbon
monoxide, radioactivity, humidity and barometric pressure, and then sends them to the
Arduino board to convert it to digital output. Arduino`s software used to control the board to
take different actions. It supports variety of products like: IoT application, wearable, entry
level and enhanced features. In addition, it is compatibles with shields that are used to provide
additional capabilities such as connecting to the Internet (Wi-Fi, Bluetooth, 6LowPAN) [36].
4.2. Raspberry Pi
Raspberry Pi is a small-sized computer and low-cost device intended for the education
field. It is used by people to improve programming skills. The Raspberry Pi advances the
Arduino microcontroller. The physical hardware is an open source and run on Linux,
Windows and Risc OS. The board consists of important things: processor, RAM and ports.
There are different types of models. The first is the Raspberry Pi A, this model is low price,
has only one USB port, uses less power computation and only 256 MB of RAM. the
Raspberry Pi A is upgraded to the Raspberry Pi A+, suitable for robotics and embedded
system. The second is the Raspberry Pi B, this model has two ports one for the Ethernet and
the other one for 512 MB of RAM. The Raspberry Pi B is also upgraded to the Raspberry Pi
B+, this model has a double number of USB ports and improved power consumption. The
third is the Raspberry Pi 2, is the replacement of B+, the important features including 1GB
of RAM and 4 USB ports. The Raspberry Pi 3 is the last model, supports important features
like it has built such as Wi-Fi IEEE 802.11n and Bluetooth [37]. There are several book`s
guides for the Raspberry Pi in [38]. Also, Raspberry Pi simulators in [39].
371
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4.3. TelosB
TelosB sensor is an open-source platform used in WSNs. The platform includes: USB
programming and data collecting capability, microcontroller, transceiver, 10KB RAM,
250Kbps and IEEE802.15.4 radio with antenna built-in and low power consumption (which
offers a long-life battery and fast wake ups from deep sleep). It uses an open-source, simple
and energy efficient TinyOs image, which was developed by US Berkeley. It is integrated
with five sensors: Temperature, Sound, Solar radiation, Light and Humidity sensors [40].
4.4. NodeMCU-ESP8266
The Node MCU is an open-source microcontroller that is used in IoT applications and
was designed by Espressif system. It is based on the ESP8266 Wi-Fi SoC (System on Chip)
and ESP-12 module. Node MCU was created on 13 OCT 2014, Arduino developed their IDE
(Integrated Development Environments) software to be compatible with Node MCU. It uses
two programming languages: The Lua scripting language and C/C++ Arduino language.
4.5. Onino-OMEGA 2
Omega 2 is a tiny microcontroller, cloud integrated and designed for building IoT projects.
It is a Linux computer server with Wi-Fi built-in and designed for connectivity and on-board
flash memory. It is a small size and has power efficiency as Arduino and flexible as
Raspberry Pi. It has new expandable docks like Expansion Dock, Mini Dock, Power Dock,
Relay Expansion Dock, Bluetooth, Cellular, GPS and Arduino Dock R2 (make use of
Arduino shield). It is a simple and an affordable to start with it. It offers users an application
store to get solutions for IoT. It can be programmed with many languages like C, C++,
Node.js, Python and PHP. It has nine sensors: humidity, temperature, gyroscope, light, LED
driver, potentiometer, pressure, gas and buzzer [41].
372
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
373
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. COE ISSUES
In this section, some problems and difficulties are explained which still appear when
integrating between IoT and cloud.
6.1. PROTOCOLS
The protocols represent a major role in complete fulfillment of the sensing requirements.
They consider as a data tunnel between IoT devices and the outside world [45]. The sensing
devices use IoT protocols like IEEE802.15.4 or IEEE802.11 to transmit data to the person
concerned. However, some gateways do not support some of the protocols that the sensor
being used. People at the most time choose a cheap and easy sensor to work with. If a sensor
is added to the network, it cannot be guaranteed that sensor will be compatible with the
gateway. It must consider whether the gateway supports the standardized protocols [15].
Using MAC (Medium Access Control) protocols make the system work efficiently. MAC
protocols (collision free) have been proposed for several areas like: DMA, TDMA, CSMA
and FDMA. However, these schemes are impossible with billions of available IoT devices.
This becomes an issue, which requires further study [46].
374
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the IDM system include; directory services, access management and Password
administration [48].
6.4. IPv6
In spite of the IPv6 gets widely used to identify devices, but some existing companies,
technologies and customers still use the IPv4. The problem comes with development of IPv6
to be compatible with IPv4 devices [49]. A solution is to enable seamless communication by
using a transition technology that is called dual stack routers. Nodes may have dual stack
support both IPv4 and IPv6 packets. In addition, use tunneling techniques in cloud
virtualization: 6to4, Teredo, and ISATAP.
7. CONCLUSION
IoT is a new concept and becoming the future of Internet, which a huge number of data
generated from things and shared across Internet around the world. A billion of devices,
applications and new technologies will connect with each other to improve the quality of life
more than anything did before. This paper shows an overview of IoT and about its history
and application domains. Some remarks are concluded related to this topic; IoT architecture
has been presented to understand the role of each IoT layers to know which the IoT
components and technologies are suitable with each layer. IoT protocols functionality existed
375
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
nowadays have been explained their functionality with open research challenges. Finally, for
providing new services arising from this integration to users, Integration cloud with IoT has
been emerged. This integration termed as Cloud of Everything, including some issues which
have been explained.
In further, we are looking into surveying the next-generation technologies and networks.
The 5G networks have been expected to handle trillions of objects by 2020 more. However,
it will be a part of IoT; connecting all mobile nodes and fixed devices with each other. New
challenges will arise from this integration that should be studied study.
8. REFERENCES
376
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[41] M. Aazam, I. Khan, A. A. Alsaffar, and E.-N. Huh, Cloud of Things: Integrating
Internet of Things and cloud computing and the issues involved, Proceedings of 2014
11th International Bhurban Conference on Applied Sciences & Technology (IBCAST)
Islamabad, Pakistan, 14th - 18th January, 2014, 2014.
[42] "FAQ - Frequently Asked Questions | MQTT", Mqtt.org. [Online]. Available:
http://mqtt.org/faq. [Accessed: 9- March- 2017].
[43] S. Lee, H. Kim, D.-K. Hong, and H. Ju, Correlation analysis of MQTT loss and delay
according to QoS level, The International Conference on Information Networking
2013 (ICOIN), 2013.
[44] Z. Shelby, K. Hartke, C. Bormann, and B. Frank, draft-ietf-core-coap-18 - The
Constrained Application Protocol (CoAP), Internet Eng. Task Force (IETF), Fremont,
CA, USA, 2013. [Online]. Available: https://tools.ietf.org/html/draft-ietf-core-coap-
18. [Accessed: 9- March- 2017].
[45] W. Colitti, K. Steenhaut, and N. D. Caro, "Integrating wireless sensor networks with
the web," Extending the Internet to Low power and Lossy Networks (IP+ SN 2011)
,2011.
[46] M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia,
and M. Dohler, Standardized Protocol Stack for the Internet of (Important) Things,
IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 13891406, 2013.
[47] M. Koster, J. Jimenez, and rfcmarkup version 1, "Publish-subscribe broker for the
constrained application protocol (CoAP)", Tools.ietf.org. [Online]. Available:
https://tools.ietf.org/html/draft-koster-core-coap-pubsub-05. [Accessed: 9- March-
2017].
[48] S. Raza, H. Shafagh, K. Hewage, R. Hummen and T. Voigt, "Lithe: Lightweight Secure
CoAP for the Internet of Things", IEEE Sensors J., vol. 13, no. 10, pp. 3711-3720, Oct.
2013.
[49] H. J. Ban, J. Choi, and N. Kang, Fine-Grained Support of Security Services for
Resource Constrained Internet of Things, International Journal of Distributed Sensor
Networks, vol. 2016, pp. 18, 2016.
[50] A. Betzler, C. Gomez, I. Demirkol and J. Paradells, "CoAP congestion control for the
internet of things", IEEE Communications Magazine, vol. 54, no. 7, pp. 154-160, Jul.
2016.
[51] A. Betzler, C. Gomez, I. Demirkol, and J. Paradells, CoAP congestion control for the
internet of things, IEEE Communications Magazine, vol. 54, no. 7, pp. 154160,
2016.
[52] J. Hui, D. Culler, and V. Manral, An IPv6 Routing Header for Source Routes with the
Routing Protocol for Low-Power and Lossy Networks (RPL), 2012.
[53] "Routing Protocol for LLN (RPL) Configuration Guide, Cisco IOS Release 15M&T",
Cisco. [Online]. Available: http://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/rpl/configuration/15-mt/rpl-15-mt-book.html. [Accessed9- March- 2017].
[54] P. Thubert, "RPL Objective Function Zero", 2012. [Online]. Available:
https://tools.ietf.org/html/draft-ietf-roll-of0-19. [Accessed: 9- March- 2017].
[55] JP. Vasseur, M. Kim, K. Pister, N. Dejean, and D. Barthel, draft-ietf-roll-routing-
metrics-19 - Routing Metrics Used for Path Calculation in Low-Power and Lossy
Networks, Internet Engineering Task Force (IETF) Request for Comments, No. RFC
377
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
378
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
379
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
380
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
to build smart planet [1]. IoT can be embedded in all aspects of life like 'Smart Home', it
includes the ways that controls the environment of the place of living like the lighting,
temperature, home privacy and security this technology can also go wider to the large
environment like cities including sensors for water and gas management, smart garages,
roads, traffics and street lighting as well as mobility these controlled sensors all embedded
in 'Smart City' that manage the quality of life (QoL) [2] and for healthcare field there's also
sensors works to evaluate the health of bodies like pulse sensor, blood sensor which is
represented by wearable devices or in other way as tablets. IoT uses real time transmitting
protocols which is the main challenge to enable real-time transferring information to create
smart system connect a huge network of devices through internet along with the security
feature [3]. There are many protocols that work with the IoT such as MQTT (Message
Queuing Telemetry Transport), CoAP (Constrained Application Protocol), XMPP
(Extensible Messaging and Presence Protocol), AMQP (Advanced Message Queuing
Protocol) and HTTP (Hyper Text Transmission Protocol) and knowing the right type of
protocol is the first design requirements. Today the cloud also become in the top of
requirements to build IoT systems for hosting the data and remotely managing the device
everywhere, it is working as database that contains millions of members to deal with daily.
IoT applications gain data from enormous resources sensors connecting between different
materials and upload them to the cloud. The cloud computing deals with the application layer
as an important layer because it's working to process and analyze the data. IoT devices are
rapidly increasing and this will lead to the 'Big Data' concept where huge amount of data
need to be processed and analyzed [4,5,6]. In this work, IoT is used to monitor Asmtha
patients by sensing their heart beat behaviour and send the recorded pulse counts to the
Cloud. The hospital, doctor, or patient relatives can continuously monitor his state and a
feedback can be send to the sensor to increase recording rate. The rest of the paper is
organized as follows: section 2 gives related researches, section 3 presents the system model,
section 4 and 5 discuss problems and challenges accompany system implementation while
section 6 state the related references.
2. LITERATURE REVIEW
In [7], the authors present a Module based on ArduinoUNO with GSM shield to connect
to the Internet and send an SMS remotely over the GSM network to the user Mobile phone
by using GSM library to have a connection with the shield without using cloud database to
save the reports of the patient in order to review and diagnosis the patient case. The work in
[8] proposed healthcare system based on IoT and using Arduino UNO platform to read sensor
data and send it to PC platform then processed with an application to display the graph of
heartbeats without mention the Wi-Fi shield or other shields that it used with the Arduino to
transfer collected data to the cloud also the authors did not explain how the remote user could
access and monitor the information from the cloud but display the heartbeats senses on the
local machine. In this paper [9] the authors use architecture of local server to detect
arrhythmia via ECG signal without describing how will be notified the medical experts in
emergent case, so in this paper the data will be send through the Internet to remote server
and there is a website to allow access by authentication person or medical experts to monitor
the patient case as well as the notification send via SMS in abnormal case. Finally, this paper
381
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[10] describes machine-to-machine M2M connection on local cloud platform to transfer data
to and from local environment while M2M connection can be accrued through WAN
environment.
3. SYSTEM MODEL
According to physicians and references related to Asthma patients, heart rate beats
increases rapidly when the patient suffers from symptoms of breathing difficulties.
Therefore, the decision to use heart beat sensor to monitor heart beat rate. The proposed
network design is devided into three layers: Embedded, gateway, and cloud layers and they
are explained in the following sections with the aid of figure 1:
Cloud
Cloud Layer
Routers
Asthma
Embedded Layer
Patient Manager
NodeMCU
382
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
manager (PC based software) is used to display the collected data from the sensor and send
them via HTTP protocol to the Cloud to be permanently save for any future analysis. The
core language used in this phase is C++.
3.2 GATEWAY LAYER:
The gateway layer is a router based network which routes the traffic coming from the
microcontroller to the required Cloud. It is evident that when public Cloud is used then this
layer might contain single or multiple hops, and in the proposed model it is fixed to a single
router.
383
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
FIGURE 3. Sample result of sensor data store in cloud. (a) HTTP connection with GET
method. (b) Sample readings of heart beat rate and (c) MySQL data insertion
5. CONCLUSION
In this paper, a proposal for healthcare system based IoT-Cloud is explained. The system
monitors the Asthma patients through sensing their heartbeat rate and store them for future
analysis. The use of heartbeat sensor is not optimistic but closely reflects the patient
condition since the one of the main asthma symptoms is fast breathing and rapid increase in
heartbeat rate. Therefore, using the heartbeat sensor is a contribution to this field as far as
test results show. For future work, the system could be extended to include multiple type
sensors and include another types of protocols.
384
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. REFERENCES
[80] A. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and M. Sheng, "IoT Middleware: A Survey
on Issues and Enabling technologies," IEEE Internet of Things Journal, Vol. 4, Issue 4,
Feb. 2017, pp. 1-20.
[81] D. Minoli, K. Sohraby, and B. Occhiogrosso, "IoT Considerations, Requirements, and
Architectures for Smart Buildings Energy Optimization and Next Generation Building
Management Systems," IEEE Internet of Things Journal, Vol.4, Issue 1, Feb. 2017, pp.
269-283.
[82] D. Chen, N. Zhang, Z. Qin, X. Mao, Z. Qin, X. Shen, and X. Li. "S2M: A Lightweight
Acoustic Fingerprints based Wireless Device Authentication Protocol." IEEE Access,
Vol.4, Feb. 2016, pp. 766-773.
[83] Y. Sun, H. Song, A. Jara, and R. Bie, Internet of Things and Big Data Analytics for
Smart and Connected Communities IEEE Internet of Things Journal, Vol.4, Issue 1,
Feb. 2017, pp. 88-100.
[84] H. Cai, B. Xu, L. Jiang, and A. Vasilakos, IoT-Based Big Data Storage Systems in
Cloud Computing: Perspectives and Challenges, IEEE Internet of Things Journal,
Vol.4, Issue 1, Feb. 2017, pp. 75-87.
[85] "Oracle: Big Data for the Enterprise - White Paper." Jun. 2013.
[86] U. S.U, O C. O and U. M. E, "Heartbeat Monitoring and Alert System Using GSM
Technology," International Journal of Engineering Research and General Science,
Volume 3, Issue 4, 2015, pp. 26-34.
[87] D. Singh and R. Gour, An IoT Framework for Healthcare Monitoring Systems, Int.
Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May
2016.
[88] M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Mateos, B. Kantarci,
and S. Andreescu." Health Monitoring and Management Using Internet-of-Things (IoT)
Sensing with Cloud-Based Processing: Opportunities and Challenges.", IEEE Int. Conf.
on Service Computing, July 2015.
[89] B. Anggorojati, N. Prasad, and R. Prasad, "Evaluation of secure capability-based access
control in the M2M local cloud platform," 10th Int. Conf. on Telecommunication Systems
Services and Applications (TSSA), Oct. 2016.
[90] "ESP8266 WiFi Module Quick Start Guide, [online]
http://rancidbacon.com/files/kiwicon8/ESP8266_WiFi_Module_Quick_Start_Guide_v_
1.0.4.pdf, (Accessed: 19 Mar. 2017).
385
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
I
n the latest years, many researchers focus on the "wireless sensor networks
(WSNs)"constructions and applications. WSNs have potential applications in
different vital areas. Wireless Sensor networks represent systems that encompass
of certain numbers of wirelessly linked sensors that are spatially deployed in a
certain region. Sensors can be deployed in large numbers due to its accepted cost
and small size [1].
One of the key challenges facing the WSNs applications is how to determine the physical
locations of the deployed sensor nodes. This problem represents an active research topic in
the recent years. The supreme solution for such problem is to provide the sensor nodes by
"Global Positioning System (GPS)". GPS is costly, power consuming and restricted for
outdoor applications. To find the optimum sensors location, a set of nonlinear equations must
be solved to reach the best prospect purpose in some cases. The effectiveness in this approach
386
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
is how to investigate the sensors deployment by searching for the optimal or the near optimal
solution [2].
2. RELATED WORK
Wen-Hwa Liao et al., presented in 2011 sensors deployment system based on "Glowworm
Swarm Optimization (GSO)" to improve the nodes coverage after a process of random
deployment. Each node was considered as "individual glowworms emitting". A "luminant
substance" called "luciferin" and the strength of the "luciferin" is relies on the distance
between the sensor node and its neighboring sensors. A sensor node is appealed towards the
lower intensity of "luciferin". The sensing field coverage was maximized when the sensor
nodes must move towards the lower sensor density area [3].
Guo, et al., proposed in 2012 a technique with goal coverage based on lattice scan. They
divided the area into lattices. Then the best lattice was selected as a position to the next
sensor. This method used smallest number of nodes to attain the coverage goal and get
enhanced positions for the deployed sensor nodes [1].
Yourim Yoon, et al., proposed in 2013 an effective "genetic algorithm" using a "novel
normalization method". A "Monte Carlo method" was assumed in designing an effective
assessment function. They showed that their computation time can be reduced without losing
the quality of the solution. They selected a small number from random samples and steadily
increase the number for the succeeding generations [4].
Alduraibi et al., They proposed in 2016 three optimization models for determining the node
density that varies in the objective. The first opts to achieve a desired level of detection
fidelity while minimizing the number of deployed sensors. The second model considers the
scenario with a constrained node count and determines the position of the available nodes
such that the coverage is maximized. In the third model, they strive to minimize the number
of deployed nodes when the desired fidelity is not uniform and some locations require higher
coverage than others. The proposed optimization formulations are generic in nature and can
be applied to any sensor coverage model [5].
3. WSN APPLICATIONS
WSN can be used to sense the object movement, sound, and temperature. It can be used
to collect information about the system and transmit it to the Base station (BS). In military
applications, WSNs can be used to observe and control the front line. Figure (1) presents a
view of some WSN architecture [6].
387
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
4. SENSORS DEPLOYMENT
The deployment approaches in WSN was divided into two groups as "sparse" and "dense
deployments". In the given field of interest the "sparse deployment" can be used with little
number of nodes deployed while the "dense deployment" can be used in high number of
deployed sensors [7]. The "dense deployment" technique was used in the case of every event
wanted to be noticed or there are multiple sensors are deployed to cover the same area. The
sparse deployment is suitable to achieve maximum sensing area with minimum number of
sensors. The sensor nodes are either static or mobile so they can change their positions with
time [2].
Sensors are deployed in certain field either by locating them in "predetermined places" or
randomly deployed. "Random sensors deployments" approach is one type of the "dense
deployments". WSNs with mobile sensors are normally initiated with a "random
deployment" and by their mobility change their locations to the best suitable location [1] [2].
388
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. SENSING AREA
The essential aim of any WSN is to have maximum sensing area (maximum coverage area).
Coverage or sensing in WSN represents the backbone issue due to its relation with the energy
consumption, network reconfiguration and connectivity. A basic problem is how to achieve
maximum effective sensing area by deploying the sensors in an optimal manner. A good
sensing area is that area in which every point in the area will covered and monitored by at
least one sensor [12].
6. GSO APPROACH
There are many approaches were suggested and implemented to achieve certain coverage
connectivity and reliability. Wen-Hwa, et al., for example suggested in 2011 a sensor
deployment
System based on "glowworm swarm optimization" to improve the coverage after an "initial
random deployment" of the sensors. They considered each sensor node as "individual
glowworms emitting a luminant" body called "luciferin" and the strength of the "luciferin"
is depending on the space isolating the sensor node with its neighboring. A sensor node can
be appealed to its adjacent with lower strength of "luciferin". When the sensor tends to move
towards the area having lesser sensor concentration then the sensing coverage area will be
maximized. Their simulation results showed that "GSO-based sensor deployment approach"
can deliver great coverage with restricted number of the sensor movements [3]. They
concluded the following GSO results:
When 50 sensors were deployed in a center of 100 X 100m area with sensing range of 5m &
communication range of 10m, they found a coverage percentage of about 35.4 %. When 100
sensors were deployed at the same area and same sensing and communication ranges, they
found coverage of 64.6 %. While when they used 200 sensors with the same area, same
sensing and communication ranges satisfied coverage of 92.2 %. This method was failed to
achieve connectivity and /or reliability with less numbers of sensors deployed randomly in
such area.
7. MARKOV MODELS
A "Markov chain" represents one aspect of the "mathematical models". It has certain
random occurrence depending on time in a specific style that the future state depends only
on the current state. The applied time can be described as discrete or continuous. In some
mathematical applications, such phenomenon which depends on time and only the present
activity will affects the next activity was called a "dynamical system". For any time t, the
upcoming path (A(x), x t) can be entirely stated by the current state A(t), without any need
to the past states. In most applications they dealt with random variables rather than the
deterministic values.
Markov chains represent a very important modelling tool that can be applied for the situations
in which the trials do not happen according to an "independent and identically distributed"
389
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
mechanism. Markovian property means that any stochastic process {xt} must have the
following property:
P{xt1= j\ x0= k0, x1 =k1, . . . , xt-1=kt-1, xt=i} = p{xt+1=j\xt=i}, for t = 0, 1, . . . and every
sequence i, j, k0, k1, . . . , kt-1. Markovian property means that "the conditional probability of
any upcoming event /(any preceding events and the current state Xt= i), is independent of the
historical events and depends only on the current state" [14].
Markov chain can be generally defined as follows: for a "set of states, S = {s1, s2,...,sn}". The
movement will be initiated in any one of these states and goes sequentially from state to state.
Each change is titled as a step. If the chain is found in certain state si, then it can go to state
sj at its next step with certain probability equal to pij. This probability value will depends on
states i and j only.
The transition probability represented by (pij) means the probability of going from state i to
state j on the upcoming step. The transition matrix collects all the transition probabilities
from state to state [2].
8. TRANSTION MATRIX
The transition probabilities are commonly expressed as an M X M matrix called the transition
probability matrix (or transition matrix), P. The transition probability matrix P and its
characteristics are given as follows [13]:
=1 = 1 for I = 1 , 2 ,.,m (1)
Based on the Chapman-Kolmogorov equation, the probability of the system moving from
State i to State j after n periods (n transitions), that is, the n-step transition probability matrix,
P (n) , can be obtained by multiplying the matrix P by itself n time. Thus:
() = (2)
0
Let the initial state vector, Q , be the probability that the Markov chain is in State i at time
0. Then, the state vector, Qn , which is the probability that the chain is in State j after n
transitions, can be expressed as:
= 0 () (3)
0
Where Q =[q1 ,q2 ,,qm]; and qi = probability of being in State i at Time 0.
390
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The area of interest is of (100 x 100m), numbers of the available sensors are (50, 100 and
200), and the sensors are initially deployed in a random manner. Net Logo is suggested to be
used as a simulation tool to create, implement and evaluate each model in this study.
Case 1:
50 sensors are deployed randomly in a 100x 100m area as shown in figure 2-a. A suitable
developed markov algorithm is used to change these sensors positions in sequential steps to
reach the best possible state shown in figure 2-a.The initial transition matrix of (10) sensors
is shown in figure 3-a. The transition probability is calculated with respect to certain
developed criterion, and after 9 iterations the transition matrix becomes as figure 3-b.
391
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Case 2:
100 sensors are deployed randomly in a 100x 100m area as shown in figure (4).
392
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Case3:
200 sensors are deployed randomly in a 100x 100m area as shown in figure (5).
Table (1) summarizes the results of the above three cases. Figure (6) shows a clear
comparison between this paper results and the GSO (developed by Wen-Hwa, et al.,) results.
From the results it's clear that the developed approach gave a good results comparing with
the GSO.
Table (1) the results of the suggested cases.
Cases No. of Field area Sensing Communication Total coverage
Sensors Range Range area
Case 1 50 100 X 100 5 10 37.8786
Case 2 100 100 X 100 5 10 74.326
Case 3 200 100 X 100 5 10 95.5595
393
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Coverage Rate
200 100 50
Figure 6: comparison between this paper results and the GSO approach
10. CONCLUSION
In this study, we have suggested and developed a markovian algorithm to develop the
process of sensors deployment. The proposed approach is to model the sensing field, nodes
positioning and the sensors communication range. The results indicate a best approach in
achieving good coverage of the sensing field and connectivity of the network as compared
to other methods such as GSO. This method ensures full connectivity and good system
reliability. Different numbers of sensor nodes are deployed randomly and then re-change
their positions in a sequential manner till reaching the final optimal location for each node.
The end position for each node is ensuring good and reliable connectivity with all neighbors
in addition to reduce the overlapping. A connected graph representation is also used to show
the network connectivity.
REFERENCES
[1] X. M. Guo, C. J. Zhao, X. T. Yang et al, A Deterministic Sensor Node Deployment
Method with Target Coverage Based on Grid Scan, Chinese Journal of Sensors and
Actuators, Vol.25, No.1, 2012, pp.104-109.
[2] Hasson, Saad Talib, and Abdul Nasir Reyadh. "A Modified Virtual Approach to Deploy
Border Line Sensors." Asian Journal of Information Technology 15.16 (2016): 2750-
2755.
[3] Liao, Wen-Hwa, Yucheng Kao, and Ying-Shan Li. "A sensor deployment approach using
glowworm swarm optimization algorithm in wireless sensor networks." Expert
Systems with Applications 38.10 (2011): 12180-12188.
[4] Y. Yoon and Y. H. Kim, An efficient genetic algorithm for maximum coverage
deployment in wireless sensor networks, IEEE Transactions on Cybernetics, (2013).
[5] Alduraibi Fahad, Noureddine Lasla, and Mohamed Younis. "Coverage-based node
placement optimization in wireless sensor network with linear
topology." Communications (ICC), 2016 IEEE International Conference on. IEEE,
2016.
394
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[6] Abbasi, Abu Zafar, Noman Islam, and Zubair Ahmed Shaikh. "A review of wireless
sensors and networks' applications in agriculture." Computer Standards &
Interfaces 36.2 (2014): 263-270.
[7] Noureddine Boudriga; "AWSN-Based system for country boarder surveillance and target
tracking", advances in remote sensing, 5, 2016. (http://www.scrip.org/gurnal/ars).
[8] Luo, Qiang, and Zhongming PAN. "An algorithm of deployment in small-scale
underwater wireless sensor networks." Chinese Journal of Sensors and Actuators 24.7
(2011): 1043-1047.
[9] Wang, Xue, Sheng Wang, and Jun-jie Ma. "Dynamic sensor deployment strategy based
on virtual force-directed particle swarm optimization in wireless sensor
networks." Acta Electronica Sinica 35.11 (2007): 2038.
[10] Lin, Frank YS, and Pei-Ling Chiu. "A near-optimal sensor placement algorithm to
achieve complete coverage-discrimination in sensor networks." IEEE
Communications Letters 9.1 (2005): 43-45.
[11] Yi,L. "Wireless sensor network deployment based on genetic algorithm and simulated
annealing algorithm." Computer simulation (2011): 171-174
[12] Boukerche, Azzedine, Xin Fei, and Regina B. Araujo. "WSN04-4: A Coverage-
Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in
Wireless Sensor Networks." IEEE Globecom 2006. IEEE, 2006.
[13] David A. Levin, Yuval Peres, and Elizabeth L. Wilmer. Markov chains and mixing
times. American Mathematical Society, Providence, RI, 2009. With a chapter by James
G. Propp and David B. Wilson.
[14] Ding, Xin, Ziyi Qiu, and Xiaohui Chen. "Sparse transition matrix estimation for high-
dimensional and locally stationary vector autoregressive models." arXiv preprint
arXiv:1604.04002 (2016).
395
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
A
Rabic language are the 5th spoken language. Its importance also comes from that
many non-Arabic origin people speaks this language. It is the language of Quran.
All Muslims who reads Quran have to read it in this Language. Arabic phoneme
recognition attracts many researchers in the world. Many techniques have been
used for this purpose. Ahmad etal [1] employed neural network with Mile Frequency
Cepstral Coefficient (MFCC), and Linear Predictive Coding (LPC) for the recognition of
isolated Arabic words. Ali etal [2] used neural network with Fast Fourier Transform(FFT),
Wavelet Transform (WT) and a combination of both for the recognition of Arabic phonemes.
MFCC have also been adopted in [3] using a decision tree based on hierarchical neural
networks. Fuzzy Systems have also been investigated for such applications. Debyeche etal
[4] used fuzzy vector quantization for the Arabic speech recognition. Taleb and Benyettou
[5] employed fuzzy neural systems and frequency parameters to identify Vowels. In [6] and
[7] Hidden Markov Model (HMM) are employed for the Arabic phoneme and speech
recognition. Fuzzy Neural Petri net have also been used for this purpose but with LPC
396
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
features only[8]. This paper investigates farther the use of Fuzzy Neural Network as a
decision making logic but with MFCC as a feature extraction technique. In MFCC the
features mimics the Human ear by adding a mile scale filter.
A/D
Segmentation Preprocessing Feature Decision making
Converter extracting
Figure (1) shows the block diagram of a phoneme classification system. At first the
speech signal is recorded via a microphone. The recorded signal is then passed into a band
pass filter to limit its frequency and avoids aliasing during sampling. The signal is then
sampled and digitized using analogue to digital converter. After digitization the signal is
segmented to extract and isolate the phonemes that have to be classified. Segmentation into
phonemes avoids the recognition of huge amount of vocabularies exist in the language if
isolated word recognition is to be used. The isolated phonemes are then feed into filtering to
reduce noise and then the signal is scaled and unified in order to remove the effect of
recording gain and speaker voice level variations. The features are then extracted from the
phonemes signal and then feed into the decision making in order to classify the phoneme.
The MFCC is the mostly used feature extraction technique in speech recognition system.
This feature extraction technique was developed in 1940 by Stevens and Volkman and
employed by Mermelstein and Davis in 1980 to extract the features of the speech signal [9].
This technique is based on the modeling of human auditory system. The study of human ear
shows that its sensitivity to low frequency components of the speech signal are linear. If the
frequency increases the ear sensitivity change to vary in logarithmic scale to the variation of
audio signal frequency to capture only important features of the speech signal. This
phenomena is implemented in MFCC scale through linear scale below 1kHz and logarithmic
scale above 1kHz. Figure (2) shows the relation between the mile scale and frequency
physical scale. This relation can be expressed mathematically as:
Mel (f) = 2595 log10 (1 +f/700) (1)
In which (f ) represents the signal frequency
and the "Mel" represent the unit that measures the frequency or the perceived pitch or of a
tone. Figure(3) shows the steps required for the calculation of MFCC. This calculation
requires seven steps they are:
397
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
A. Frame Blocking: Frame the speech signal into blocks of approximately (10 to 30 msec)
in length (at sampling rate 16 kHz) over which the characteristics of the speech Signal are
fairly stationary. Results of the framed signals (blocking into blocks of N sample) [10].
B. Windowing: The samples of speech within each frame are multiplied by a finite-
duration window. The shape of duration of the window determines the time and frequency
resolution that can be represented in the data. One of the most popular window function in
ASR systems is the hamming window defined in Equation (2). The effect of widowing is
shown in figure (4). [10].
398
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2n
w(n) = 0.54 0.45cos(N1)
0nN1 (2)
C. Fast Fourier Transform: After windowing, the power spectrum of each data frame is
calculated. The most commonly used spectral estimation technique is the Fast Fourier
Transform FFT. The vocal tract shape is revealed by the spectral analysis.
For the finite duration sequence {y(n)}, the Discrete Fourier Transform is defined as:
Y(k) = N1
n=0 y(n)e
jkn/N
= N1
n=0 y(n)W
nk
In which (0 n, k N 1) (3)
D. Mel Filter Bank Processing: This Mel filter function is to smooth the frequency
spectrum, such that it closely model the human ear sensitivity. The Mel frequency scale
calculation is performed using a set of band-pass filters varies between 13 and 24, depending
on the bandwidth of the signals that are being processed. The filter output Z(m) can be given
as[9]:
k
1
2
m = 1M (4)
In which M: is the number of the filter banks.
Sm(k): the triangular filter banks as shown in figure (5).
399
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
E. Log Magnitude: After Mel scale filtering the logarithm of the output of each filter bank
is calculated. The logarithm can be regarded as a crude approximation of the non-linear
intensity-loudness relationship associated with the human auditory system. An important
advantage of this processing step is that it makes the shape of speech spectra insensitive to
different loudness levels amplification factors in the linear energy domain become constant
offsets in the log-energy domain and if these are properly compensated for, the resulting
spectra are independent of differences in absolute loudness [11].
F. Discrete Cosine Transform or DCT: The discrete cosine transform (DCT) is applied to
Mel-scaled log energy vectors in order to obtain features that are statically independent.
The resulting Mel-scaled cepstral coefficients (MFCCs) are ordered such that higher order
coefficients explain less variance [10,11].Because the higher order coefficient contain less
information after the application of the DCT, the cepstral vector can be truncated to
Contain fewer components than the number of filters in the Mel-scaled filter bank.
M
(2m 1)j
Cx (j) = (log(Z(m)) cos [ ]
2M
m=1
j = 1,2, . . J 1 (5)
Where Cx (j): is the jth Mel Frequency Cepstrum Coefficients.
J: is the desired length of the cepstrum.
M: is the number of filter banks.
G. Energy Features: In addition to the features describing the spectral envelop, a caustic
feature vectors usually also contain features that are related to the energy in the signal. The
cepstral coefficient, c is often used as a measure of the mean log-energy in each frame. It is
sometimes replaced by (or used in addition to) the log-energy that is directly computed from
the signal at frame level (Log E) [10].
E n =
[x(m). w(n m)]
2
(6)
where, x(n) represent the signal, w(n) represent a window function (such as Hamming
window) and En is the short time energy at discrete time n.
Another time dependant sequence, which can serve as representation of speech signal is the
short-time average zero-crossing rate. A simple technique to measure the frequency contents
of a signal can be found by the rate at which zero crossing occurs. The short-time average
zero-crossing can be given by the following Equation [10].
400
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1
Zn = 2N
|sgn[x(m)] sgn[x(m 1)]w(n m)| (7)
1 () 0
sgn[x(n)] = { (8)
0 () < 0
w (n): is a window function.
N: is the window length.
According to the MFCC algorithm, the performance of MFCC might be affected with the
following factors: The first factor is number of the filters used in the filter bank. The second
is the shape of the filters used (triangular, rectangular or Schroeder). The third factor is the
spacing of these filters, whether they are overlapped or not. And the fourth factor is the way
that power spectrum is warped.
The fuzzy neural Petri net uses the Petri net stricture, embeds the fuzzyfication in the input
place and employs the back propagation algorithm as a learning role. Figure (6) shows the
basic structure of the fuzzy Petri net. In general Petri net consists of a number of places
which are input, hidden or output places. These places are connected by arc and separated by
transitions. In the fuzzy neural Petri net the input places are the input layer, the transitions
are the hidden layer and the output places are the output layer.
401
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The features are the MFCCs are fuzzyfied and marked in the input places. The transition are
fired based on the value calculated based on the weights connecting input places and
transitions and also based on threshold limit of each transition. The output places are marked
based on the weights connecting transitions with the output place. Figure (7) shows a typical
of the net showing the notation used. The equations relating different parts of the network
are as follows:
x f (input( j )) (9)
j
x min(x)
average( x) min(x) , if x average( x)
(10)
max(x) x
f ( x) , if x average( x)
max( x) average( x)
1 , if x average( x)
n
Zi T [Wij S (rij X j )] (11)
j 1
Wij is the weight between the i-th transition and the j-th input place;
- rij is a threshold level associated with the level of marking of the j-th input place and the
i-th transition;
- Zi is the activation level of i-th transition
T is a t-norm, S denotes an s-norm, while stands for an
Implication operation expressed in the form
Where a, b are the arguments of the implication operator confined to the unit interval.
If t-norm is defined as a multiplication operator () then
402
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
xj
, if rij x j
rij x j rij (13)
1, otherwise
xj
n
, if rij x j
Zi Wij rij (14)
j 1 1, otherwise
- Yk is the marking level of the k-th output place produced by the transition layer and
performs a nonlinear mapping of the weighted sum of the activation levels of these
transitions (Zi) and the associated connections Vki
No.ofTransitions
Yk f ( V Z ),
i1
ki i k 1,2,...,m (15)
1 m
E (tk yk ) 2 (16)
2 k 1
tk is the k-th target;
The updates of the parameters are performed according to the gradient method
Where Eparam E is a gradient of the performance index E with respect to the network
parameters, is the learning rate coefficient, and iter is the iteration counter.
403
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The nonlinear function associated with the output place is a standard sigmoid described as
1
yk
1 exp( ZiVki ) (18)
E
1- Vki (19)
Vki
E E yk
Vki yk Vki (20)
E
(tk yk )
yk (21)
yk
yk (1 yk )Zi
Vki
exp(ZiVki )Zi
1 exp(ZiVki ) (22)
E
2- rij (25)
rij
404
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
E E yk Zi
rij yk Zi rij (26)
E
(tk yk )
yk (27)
yk
yk (1 yk )Vki
Zi (28)
n
Zi T [Wij S (rij x j )] (29)
j 1
Zi
A (Wij (rij x j ) Wij (rij x j ))
rij rij
A(1 Wij ) (rij x j )
rij (30)
Where
n
A T [WiS (ri x )] (31)
1
j
xj x j
, if rij x j 2 , if rij x j
(rij x j ) r rij
rij rij ij 0, otherwise
1, otherwise
(32)
405
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
x j
exp(ZiVki )Vki n , if rij x j
rij (tk yk ) T [WiS (ri x )](1 Wij ) rij2
1 exp(ZiVki ) 1 0, otherwise
j
xj x j
n
, if ri x , if rij x j
Vki * Wi ri *(1 Wij ) rij2
1 1, otherwise
0, otherwise
j
(33)
E
3- Wij (35)
Wij
E E yk Zi
Wij yk Zi Wij , k=1,2,,m, i=1,2,, hidden, j=1,2,, n.
(36)
E
(tk yk )
yk (37)
yk
yk (1 yk )Vki
Z i
exp(Z iVki )Vki
1 exp(Z iVki ) (38)
406
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Zi
A (Wij (rij xi ) Wij (rij x j ))
Wij Wij
n
A T [WiS (ri x )]
1
j
xj
, if rij x j
(rij x j ) rij
1, otherwise
(40)
xj x j
n
, if ri x , if rij x j
Vki * Wi * ri *(1 rij2 )
1 1, otherwise
0, otherwise
j
(41)
Hence, the update of parameter learning is performed using equations (23 and 24) for Vki
equations (33 and 34) for the update of rij , and equations (41and 42) for the update of Wij
4. EXPERMENTAL RESULTS
In the recognition system proposed her, 33 Neural Fuzzy Petri Nets NFPN are used.
One network for each phoneme. 23 input places are used for each network, corresponding to
407
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the input feature for MFCC. The feature vector is first fuzzified, then used as input to each
of the NFPN the number of transitions was selected between 22 to 33 based on the phoneme.
Each NFPN has one output place. Twelve cases are token for each phoneme and applied to the
network. The network is trained such that its output place is one corresponding to the phoneme
that it represents as zero otherwise. (1*10-5) error goal was selected as stopping criteria for
the training phase of the network. The network is then tested using the twelve set for each
phoneme (testing phonemes) as input to the network and total recognition accuracy is
calculated to be as:
Table (1) shows the resulting total classification accuracy obtained in the testing phase. As can
be seen from the results, some of the phonemes classification reaches 100%. However, others
have poor classification. The total classification accuracy for all phonemes are 74.93%.
5.CONCLUSIONS
This work proposes Arabic phoneme classification technique uses MFCC and FNPN. The
proposed system was tested and it have been found that the total classification accuracy is
74.93% comparing the results with that obtained in [8] that uses linear predictive coding
which have accuracy of 71% and most of the phonemes, have improved accuracy.
408
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
409
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
References:
[1] A. M. Ahmad, S. Ismail and D. F. Samaon, "Recurrent neural network with back propagation
through time for speech recognition," IEEE International Symposium on Communications and
Information Technology, 2004. ISCIT 2004., , pp. 98-102 vol.1. 2004.
[2] A. A. Ali, M. A. Alwan, and A. A. Jasim. "Hybrid Wavelet-Network Neural/FFT Neural
Phoneme Recognition." Proceedings of The 2nd International Conference on Information
Technology. pp. 39-47, Amman Jordan. 2005.
[3] Abduladhem A. Ali and I. T. Hwaidy "Hierarchical Arabic Phoneme Recognition Using
MFCC Analysis". Iraq J. Electrical and Electronic Engineering, vol.3, pp.97-106, 2007.
[4] M. Debyeche, A. Amrouche and J. P. Haton, "Distributed TDNN-Fuzzy Vector Quantization
for HMM speech recognition," 2009 International Conference on Multimedia Computing and
Systems, Ouarzazate, pp. 72-76, 2009.
[5] A. Taleb and A. Benyettou, "Arabic Vowels Fuzzy Neural Network Recognition". Journal of
Applied Sciences, vol.10, pp.848-851, 2010.
[6] A. A. Abushariah et al. "Arabic speaker-independent continuous automatic speech recognition
based on a phonetically rich and balanced speech corpus." International Arab Journal of Information
Technology (IAJIT) vol.9, no.1, pp.84-93, 2012.
[7] Gadeed, Ashwag, and Talaat Wahbi. "The Recognition of Holy Quran Reading types
Rewaih." International Journal of Advanced Research in Computer Science vol.5. no.3,pp.37-40,
2017.
[8] Ghassaq S. Mosa, and Abduladhem Abdulkareem Ali. " Arabic Phoneme Recognition Using
Neural Fuzzy Petri Net and Lpc Feature Extracting." The International Arab Conference on
Information Technology (ICIT-2009).
[9] R. M. Hegde, "Fourier Transform Phased-Based Features for Speech Recognition," Ph.D. Thesis,
Department of Computer Science Engineering, Institute of Technology, India, 2005.
[10] L. Rabinar and R.W. Schafar "Fundamental of Speech Recognition ",Prentice Hall, 1993.
[11] H. Xie ,"Speech Analyzer in an ICAI System for TESOL ",M.Sc. Thesis, Computer science,
Victoria University of Wellington, 2004.
410
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
he polygonal discretization, particularly triangular discretization are widely
used for representing discrete surface in computer applications for example
smooth shading [1, 2], surface reconstruction from cloud of points and in
numerical simulation methods such boundary and finite element methods. More
applications can be found in direct rendering of points in computer graphics [3]. This
discretization leads undesirable noise and small-scale oscillation. Therefore, the quality
improvement for the discrete surface is needed. The mesh improvement has been widely
used in many areas, such as mesh generation [46], simplifying discretization [7],
dynamic grid or mesh deformation [89], and other mesh processing procedures. Mesh
improvement approach can be basically divided into two main categories, topological
optimization and smoothing (also called geometrical optimization). Topological
optimization changes the topology of a mesh, that is, the node-element connectivity
relationship, while smoothing or geometrical optimization improves mesh quality by
simply moving or adjusting node positions without changing the topology of mesh. This
paper will focus on the latter, smoothing [10].
The most two popular approaches for smoothing and reducing the noises in triangular
surface are minimizing the total energy stored in the line segments that connects the
points in the mesh and Laplacian smoothing [11].
411
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2. PROBLEM STATEMENT
Laplacian smoothing is a common, simple and efficient technique to improve of the
polygonal mesh in general and particularly in the triangular mesh. Most smoothing
techniques including Laplacian smoothing move the vertices of the polygonal mesh without
changing the connectivity of the faces and vertices. The smoothed mesh has exactly the same
number of vertices and faces as the original (see figure 1). Laplacian smoothing is an iterative
process, where in each step every vertex of the mesh is moved to the barycenter of its
neighbors. A great deal of mesh smoothing algorithms have been proposed in the literature.
The most common techniques are based on Laplace smoothing [12, 13]. Taubin [12]
introduced signal processing on surfaces that is based on the definition of the Laplacian
operator on meshes and developed a fast and simple iterative Laplacian smoothing scheme.
When Laplacian smoothing is applied to a noisy three dimensional triangular mesh without
constrain, noise is removed but the problem is that this procedure produce Shrinking.
w r i i
U ( p) i
p, (1)
w i
i
where summation is taken over all neighbors of p, wi are positive weights. The Laplacian
smoothing for any point p is;
pnew pold U ( pold ), (2)
where 0 < < 1 is the weights. The geometric idea behind Laplacian smoothing algorithm
(2) is to reduce the high noise surface and tends to flatten every patch of the surface as shown
in figure 1.
412
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
A n i
e
i
n i 1
k
, (6)
An
i 1
e
i i
e
Where n is the unit normal of the face fi and Ai is the area of the triangle fi (see figure 1)
i
The second weight method wi is the sum of all length of the edges that passes the node Qi,
Mi
wi Qi rj , (7)
j
where rj, Mi are the surrounded nodes and the number of surrounded of Qi, respectively.
Third weigh factor is,
wi=vi (8)
where vi is the volume of the pyramid that generated by projecting the triangle fi on the plane
Z=0. Therefore, if we denote the vertices of the triangle fi in the local coordinates by ri, ri1, O
, then the base vertices of the pyramid are ri, ri1, ri, ri1, where ri, ri 1 are projected points of
ri, ri1, on the plane Z=0, respectively (see figure 2b).
a b
FIGURE 2. (a) Sketch of the surrounding triangular elements to the node p at the local
coordinates system O-XYZ. (b) Pyramid with origin O is apex and base vertices are
ri, ri1 , ri, ri1.
4. NUMERICAL EXAMPLES
Two geometrical shapes are destroyed randomly in this section, then the algorithm for
smoothing sections 2 and 3 are implemented. In the first one, suppose a unit sphere is
discretized into optimal triangular surface. Then it is randomly destroyed in all directions
(figure 3 (a)). In figure 3(b)-(f) the weights in equations (3)-(5), (7)-(8) are used in the
413
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Laplacian smoothing (2), with =0.5 and 5 time repeated respectively, here the number of
triangle is 2000.
(e) (f)
(d)
FIGURE 3. The unit sphere surface with 980 triangular elements (a) Deformed the unit
sphere randomly in all directions. Laplacian smoothing applied 5 times, =0.5 and with using
weight functions (b) in equation (3); (c) in equation (4); (d) in equation(5); (e) in equation(7)
and (f) in equation(8).
In Figure 4 the same process of figure 2 repeated with the increasing number of iterations
into 20. It is clear that the surfaces are smoother in the previous cases. In the table 1, relative
changes in the volume have been presented, when the Laplacian smoothing applied with all
weights in sections 2-3. The same parameters in the case figure 3 used but for different
number of triangles. It is clear that the relative change of volume reduce with increasing
triangle number (m) on the surface and the volume changes smaller in the proposed weights.
414
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
(d) (e)
FIGURE 4. Laplacian smoothing applied 20 times, =0.5 and with using weight functions
(a) in equation (3); (b) in equation (4); (c) in equation(5); (d) in equation(7) and (e) in
equation(8).
where r1=0.8 and r2=0.4 as showed in figure 5(a). The points in on the torus can be
considered as a parabolic, elliptical or hyperbolic point. Therefore, this type of the surface is
good for investigation. Half of the torus perturbed randomly, then all weights in section 2
and 3 in the Laplacian smoothing implemented for 20 cycles wit =0.5. The number of
elements is 8214.
415
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
FIGURE 5. Laplacian smoothing applied 20 times, =0.5 and with using weight functions
(a) in equation (3); (b) in equation (4); (c) in equation (5); (d) in equation(7) and (e) in
equation(8).
TABLE 2. Relative change of Volume V when Laplacian smoothing implemented 20 times with all
weights in sections 2-3 for difference number of elements m.
m V %
Eq. (3) Eq. (4) Eq. (5) Eq. (7) Eq. (8)
5. CONCLUSION
Laplacian smoothing is a simple and efficient technique to improve mesh quality. The
only problem in the Laplacian smoothing is when it is implemented iteratively, the surface
shrinking. The weight factor may have rule for the amount of shrinking. In this paper, three
new weights proposed and numerical examples are considered for the comparison purpose.
6. REFERENCES
[1] H. Gouraud, Continuous shading of curved surfaces. IEEE transactions on computers,
100(6), pp. 623-629, 1971
[2] BT. Phong, Illumination for computer generated pictures. Communications of the
ACM, 18(6), pp. 311-317, 1975.
[3] G. Schaufler and H.W. Jensen, Ray tracing point sampled geometry. Proceedings of
the Eurographics Workshop on Rendering Techniques 2000 pp. ( 319-328), 2013
[4] J. Liu, Automatic triangulation of n-D domains, in Proceedings of the
CAD/Graphics91, pp. 238241, Hangzhou, China, 1991.
416
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[5] E. A. Dari and G. C. Buscaglia, Mesh optimization: how to obtain good unstructured
3D finite element meshes with notso-good mesh generators, Structural Optimization,
8, (2-3), pp. 181188, 1994.
[6] P. L. George, Improvements on Delaunay-based three dimensional automatic mesh
generator, Finite Elements in Analysis and Design, 25( 3-4) pp. 297317, 1997.
[7] J. Li and G. Lu, Mesh simplification and optimization with edge collapse and mass-
spring model, Journal of Computer-Aided Design and Computer Graphics, 18(3), pp.
426432, 2006.
[8] N. Qin, X. Liu, and H. Xia, An efficient moving grid algorithm for large deformation,
Modern Physics Letters B, 19 (28-29), pp. 14991502, 2005.
[9] X. Liu, N. Qin, and H. Xia, Fast dynamic grid deformation based on Delaunay graph
mapping, Journal of Computational Physics, 211(2), pp. 405423, 2006.
[10] S. Sun, M. Zhang, and Z. Gou, Smoothing Algorithm for Planar and Surface Mesh
Based on Element Geometric Deformation. Mathematical Problems in Engineering
Volume 2015, Article ID 435648, 9.
[11] Y. Ohtake, A. Belyaev and I. Bogaevski, Mesh regularization and adaptive smoothing.
Computer-Aided Design, 33(11), pp.789-800, 2001.
[12] T. DeRose, T. Duchamp, H. Hoppe, J. McDonald, and W. Stuetzle. Mesh optimization.
In Proceedings of SIGGRAPH, pp. 1926, 1993.
[13] M. Gross and A. Hubeli. Fairing of nonmanifolds for visualization. In Proceedings of
IEEE Visualization, pp. 407414, 2000.
[14] T. Gabriel. A signal processing approach to fair surface design. In Proceedings of the
22nd annual conference on Computer graphics and interactive techniques, pp. 351-
358. ACM, 1995.
417
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
418
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
DNA sequences are used to encrypt information in the encryption of the communication
methods, mainly the ones that need a robust data encryption scheme to challenge
unauthorized access. DNA sequences, which consist of the following nitrogenous bases: (A, T,C,
G), complementary to RNA sequences, which consist of the following: (U, A, G, C). The non-
coding segments, called introns in DNA sequences, are removed by splicing and the remaining
segments that encode information for protein synthesis, called exons, are assembled in mRNA
[7].
4. CRYPTOGRAPHY
419
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
420
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The encryption process begins with an Addroundkey stage, and followed by nine rounds of
Sub Bytes, Shift Rows, MixColums and Addroundkey transformation. The transformation
will be performed respectively, and iteratively (Nr times) depending on the key length. The
final round will only include 3 stages; Sub Byte, Shift Rows and Addroundkey. All of the
operations are byte- oriented. The encryption and decryption structure consists of several
transformation stages as shown in Figure (2). The decryption is essentially the same structure
as encryption, but Sub Byte, Shift Row and MixColums are replaced by their inverses;
InvSubBytes, InvShiftRows, InvMixColumns, and Addroundkey. It is the reverse order of
the encryption structure [9].
One of the main features and responsibility of the E-government is that it must provide
secure access to the information. In this paper a proposed secure authentication method is
presented. In the proposed method DNA coding with AES is used together to provide the
authentication. The proposed method has three authentication levels based on specific ID
length that is used (if the ID length is 64 bits then the authentication level is the first, if the
ID length is 128 bits then the authentication level is the second, if the ID length is 192 bits
then the authentication level is the third).The ID that is based is given to every user under
the control of the specific E-government system. The ID is generated based specific steps
(Algorithm 1), after that these IDs are stored, and then these IDs are given to the users of the
E-government system. If the user want to use the system under the control of the E-
421
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
government he\she use the ID , then the ID is processed according the steps of the algorithm
(Algorithm 2).
Start
Assign ID to user
End
422
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
ID generation algorithm
423
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Start
Input ID
Convert to characters.
Is there any
matching with stored
Yes characters? No
End
424
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Input:- ID
Output:- Perform specific authentication
Begin
Step1:-Read the ID.
Step2:- Read the corresponding key from the specified database.
Step3:- Apply AES decryption method.
Step4:- Convert AES decryption result to DNA codes.
Step5:- Convert DNA codes to binary representation.
Step6:- Convert binary representation to ASCII values.
Step7:- Convert ASCII values to characters.
Step8:- Compare the resulted characters after the process with the stored characters if
there is match allow access and perform required action otherwise ignore the access.
End
5.1 Simulation of the proposed method process
In this section example of the proposed method will be explained in details in two
phases the first phase is the ID generation phase and the second phase is the
Authentication phase.
First phase
Step1:- Read the characters
abcdefgh
Step2:- Convert characters to ASCII values
097 098 099 100 101 102 103 104
Step3:- Convert ASCII values to binary representation.
0110000101100010011000110110010001100101011001100110011101101000
The result will be as follow:
Step4:- Convert binary representation to DNA codes using table (1)
425
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
426
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
U2FsdGVkX18WeQCa34kWz3feWGYBrYFbvGQ46rSAzS2n4GAG8RgFY44Ix0
odpFMsvvFUB3QSyZICkxYU4LgTLA==
Step2:- The corresponding ID key will be read from the specific database which is now
64646464
Step3:- Apply AES decryption using ID as ciphertext with the mentioned key. The
result will be as follow:-
32013202320032331211121212131220
Step4:- Convert decimal values to DNA codes using table (2).
TGAC TGAG TGAA TGTT CGCC CGCG CGCT CGGA
Step5:- Convert DNA codes to binary representation using table (1).
0110000101100010011000110110010001100101011001100110011101101000
Step6:- Convert binary representation to ASCII values.
097 098 099 100 101 102 103 104
The proposed authentication method has good security level since if the unauthorized
users want to access the specific system under the control of the E-government needs to
know the following information:
1. The entered characters that are used to generate the ID. Since there are 256
characters and the number of the accepted entered characters lengths are (8
characters, 16 characters, 24 characters) so the possibilities as follow (8256 ,
16256 , 24256).
2. The arrangement of the based DNA codes. Since there are four DNA codes , so
the number of the possibilities is (44=256).
3. The AES encryption key.
427
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
7. CONCLUSIONS
E-government security system is the more important issues today. In the proposed
method three levels of authentication are provided. The authentication level based on
the ID length that is used if the ID length is 64 (8charcaters) bits then the authentication
level is the first, if the ID length is 128 (16 characters) bits then the authentication level
is the second, otherwise the authentication level is third 192 (24 characters ). The based
ID generation based on DNA Coding with AES.
REFERENCES
[1] Renta Mchov, Martin Lnnika1 , Reframing E-Government Development Indices
with Respect to New Trends in ICT, REVIEW OF ECONOMIC PERSPECTIVES ,VOL. 15,
ISSUE 4, 2015, pp. 383411.
[2] Jinan N. Shehab 1, Hussien Y. Radhi 2, Ruwaida A. Ibrahim3 , Multimedia
Cryptography Based On Liu And Chen Systems , Diyala Journal of Engineering Sciences ,
Vol. 09, No. 04, pp. 24-35, December 2016.
[3] Mohammad A. Alia, Abdelfatah Aref Tamimi, and Omaima N. A. AL-Allaf ,
Cryptography Based Authentication Methods , WCECS 2014, 22-24 October, 2014, San
Francisco, USA.
[4] Menezes, A., P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography,
CRC Press, pp.4-15, 516, 1996.
[5] Hasanen Samir Abdullah ,An Improved DNA Computing Approach Using Heuristic
Techniques , PhD Thesis ,computer science department ,University of Technology
,2008,Iraq.
[6] Palvia, S. C., Sharma, S. ,E-Government and E-Governance: Definitions/Domain
Framework and Status around the World , (2007). Hyderabad, India: IECG.,
[7] Dr.Alia Karim Abdul Hassan Huda nahi ali , Proposed Information Protection method
Using RNA
Computing , Iraqi Journal of Information Technology , Year: 2016,Volume: 7 Issue: E2
Pages: 118-136.
[8] Mansoor Ebrahim , Shujaat Khan, Umer Bin Khalid , Symmetric Algorithm Survey: A
Comparative Analysis, International Journal of Computer Applications (0975 8887)
Volume 61 No.20, January 2013.
[9] Dr. Alaa Kadhim , Sura Khalaf , Proposal New S-box for AES Algorithm Depend on
A.I Bee Colony , Eng. &Tech.Journal, Vol. 33,Part (B), No.1, 2015.
428
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Mardin A. Anwer
Software and Informatics department, College of Engineering, Salahaddin University - Iraq
mardin.anwe@su.edu.krd
Rina Dinkha Zarro
Software and Informatics department, College of Engineering, Salahaddin University - Iraq
rina.zarro@su.edu.krd
Kamaran HamaAli Faraj
Computer department, College of Science, University of Cihan-Sulamani KRG
Computer department, College of Science, University of Sulamani-KRG
kamaranfaraj@yahoo.com
429
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
nline social networks are a kind of virtual communication (VC) that allows
O
people to connect with each other. The importance of staying together as a
community is the main idea of social network [1]. Unlike traditional media
(TM), social media relies on user-generated content, which refers to any
content that has created by end users or the public as opposed to professionals.
TM such as radio, books, and network television (TV) is primarily design to
be a broadcast platform (one-to-many), whereas social media is design to be a dialogue
many-to-many (M2M) interaction [2]. There are many types of social network, which
depend on its features. These features are geographic location like Orkut in Brazil,
VKontakte in Russia or well-known globally, like Facebook and Twitter or business-
oriented like LinkedIn and Xing [3]. Online social media is fully electronic because of
participating users and publics and it is (M2M), but TV is semi electronic online social
networking because of (one2Many), the traditional for example books is a book for a
user. In 1997, the first social networking media emerged. It was called Sixdegrees.com.
This site permits the user to create profiles, list their friends and surf the friends list [4].
Starting from 1997 to 2010 there are some 1.5 billion users of social networking
websites [5].
This paper is included six sections; related work is outlined in section two, Section
three is presenting different kinds of social media-where some statistical data will be
introduced about the usage of these kinds, section four explains the privacy issue of
using the social media, also the proposed architecture and analysis of the solutions
related to security is detailed in section five, Section six is about finding and discussion
when applying the proposed design. The final section draws conclusions of the research.
2. Related Works
Many research and white papers discussed the security and privacy issues in social
media network. They concluded many solutions related to this concern. Most of them agreed
that the user should be aware of the information that posted in the social media. Kevin
(2013) did an experiment on 486 students from the University of Cape Town (UCT), South
Africa. The data also shows that UCT students perceive friends and total strangers to be
their main audiences on Twitter; the attitude of UCT students towards Facebook remained
positive, on the other hand, a less positive attitude was experienced from the students using
Twitter; and Facebook is a more popular method for communication between students. The
results obviously highlight the changes in usage, attitude and perception of Facebook [6].
Brad in 2011 inspected some of risks in three social media websites which are Facebook,
Twitter and LinkedIn and identify. He presented possible solutions to help protect the user,
users personal information and users company data [7]. Brand explained how is possible
to identify the legitimate messages from the hoaxes by doing simple steps. Using an up-to-
430
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
date email client and date antivirus/anti-malware software, also never open an attachment
unless it is from someone you know are the main advices from Brand. Giles in 2007
highlighted and addressed privacy and security risks associated with Social Networking
Sites. He provided recommendations on how to minimize these risks. He offered strategies
to improve privacy and security without compromising the benefits of information sharing
thus increasing the overall social value of Social Networking Sites. He promoted Stronger
Authentication and Access-control where appropriate Threats: Digital Dossier, Ease of
Infiltration, Squatting, Spear Phishing, Stalking, SNS Spam, and Social Aggregators.
Similarly, increase transparency of Data-handling [8].
In 2013, Bill et al discussed some of dangers when using social media and how to use
these sites more safely. For example, he explained how many social networking sites allow
user to use encryption called HTTPS to secure the connection to the site. Some sites like
Twitter and Google+ have this enabled by default, while other sites require user to manually
enabled HTTPS via account settings [9]. In the same year, Abhishek et al proposed an
architecture for secure request response exchange of data between users. This architecture
improves the customization of profiles. It suggests that only a proper knowledge of the
hacking strategies will prove the best defense in the war against cyber-attacks. According to
their architecture, the visitors or friends request for any information to the application
between the visitor and the user. The application requests to the user for the response then
the user can response from any one of the databases according to his trust on the person who
has requested for the information [10].
Although there are many brands of social media which have its own unique architecture
that shapes the types of interactions that can occur [11], they all have the same target, which
is sharing a mutual interest and gain a method of interaction or information sharing through
the service. Services vary in their scope, the pace of interaction and the type of content that
is shared such as videos, images and text. The services control the type of connection between
the users, items and data retention policies [12].
Indeed, small changes in the design of social media tools and policies around them can be
vital to their success and failure [13]. Table one list the top ten social media on 2016
according to ebizmba website.
1 Facebook 1,100,000,000
2 YouTube 1,000,000,000
3 Twitter 310,000,000
4 LinkedIn 255,000,000
431
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5 Pinterest 250,000,000
7 Tumblr 110,000,000
8 Instagram 100,000,000
9 Reddit 85,000,000
10 VK 80,000,000
A main concern about using social networking sites is privacy. Privacy can be defined as
the process of respecting the desires of individuals where compatible with the aims of the
larger community. Privacy is not about what people expect but about what they desire.
Privacy is not merely an individual right; it is an important component of any flourishing
community [15]. When you are online, it means that nothing is private. The problem is that
all the information, posts and images that is posted online can last for very long time.
Consequently, these posts can be shared all around the world. In 2007, Pew Internet &
American Life conclude from their study that 66 percent of teens restrict their online profile
by making it private. They found 82 percent teens post their first name, followed by photos
of themselves (79%), name of city (61%) and email address (29%). The situation is different
for girls. They commonly do not post information that could help in finding their physical
location [16]. During the last ten years, academics explored the threat to privacy linked to
social media. Gross and Acquits in 2005 analysed 4,000 Carnegie Mellon University
Facebook profiles and outlined the potential threats to privacy contained in the personal
information [17].
There are privacy settings in every social media site. The user can control their privacy
by selecting the best options that suite the users situation. Figure 1 shows the privacy settings
in Facebook.
432
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
An Instagram users can set their privacy preferences such that their posted photos and
videos are available only to the users followers that requires approval from the user to be
their follower. Such actions will appear in referenced users Updates page so that users can
keep track of likes and comments about their posts. Given these functions, Instagram is
regarded as a kind of social awareness stream [18]. Like other social media platforms such
as Facebook and Twitter [19]
In Twitter social media site, the user has the option of publicly displaying their tweets or
keeping them private. Figure 2 shows the privacy Settings in twitter.
In spite of, the security provided in privacy settings, there are lots of threat regarding this
matter. In July 2009, the wife of the chief of the British secret service MI6 posted highly
revealing details on her Facebook page. This information included Family details, personal
photos and location of their home. This led 200 million people to access this information.
This resulted to national security risk Sophos survey 2010 [20].
In this section, two-tier authentication for signing in a social network will be introduced.
Then some techniques that might be adopted to increase the privacy in social media
networks.
433
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
person who has the phone cannot access the user account because he must use ID for logging
in as shown is figure3. When the user enters his username and password to the system these
data will be encrypted using secure hash function (SHA-2). A hash function or one-way hash
function can be defined as a function that takes an input as arbitrarily long string of bits (or
bytes) and produces a fixed-size result [21]. There are SHA-0, SHA-1, SHA-2. SHA-1 is
fast, but its speed is a weakness because brute-force attacks can perform faster. Therefore,
using SHA-256 (SHA-2) provides more protection against brute-force attacks in spite of
being a slower hash than SHA-1. Figure 3 present the proposed architecture for signing up
Facebook as an example.
The same process is required for normal user. For normal user, it has to categorize them
as student or user (any other type except employee and student). If the user is a student, then
he should create his account while he is at school. In this case, the location of the school and
the ID will be officially identified. For other users, they can create their account at home and
use passport for introducing themselves and use their Gmail, yahoo, Hotmail or any ordinary
email account. The process of logging in required the user to enter the username, password
and his ID. The username and password will be hashed again using SHA-2 and will be
compared with the one that is saved in the social media database. If they are correct, then the
system will ask the user to scan or upload the ID that is used before in the signing up process.
The extracted information for the ID will be compared with the one is saved in the database.
If they are the same then the access is granted. When the user enters the work email, a copy
of his email should be directed to HR (Human Recourse) office or the manager. Using
business email confirm the identity of the user as an employee in this company. This means
the responsible is aware of the employees who use their work identity in their social media
account. Figure 4 shows the general two tier architecture of our proposed system. Database
as a backend is sql server and the middleware is C# for communicate backend and frontend.
The connected frontend is a scanner to scan ID and send it to database. Two tier architecture
is more than enough for the staff academy of college of Engineering- Salahaden University.
The new contribution of our proposed system is security on 2TA. Nevertheless, Figure 5
shows the process of signing in of users.
434
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In Instagram, there is the problem of viewing all followers and following. Talking about
privacy term it can be said that Facebook introduce more privacy option for their users. Thus,
Instagram can provide options that make the account as private and private followers and
following. Figure 6 shows the recommend type of account as proposed.
Photos and videos that the user share in social network can give others a clear picture of
users life. It is easy to share photos that show your house number, street name, children's
names or office location. Yet, these pictures can be used for other issues. Many social media
network users claim that their pictures are downloaded and then uploaded by unknown
person or using these pictures as type of threating. Some of social media user upload their
pictures in many occasion and some of them might be embarrassing. Today many employers
look online profile before giving the job offer, because they do not want to see only one side
435
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Also, a message can be added to notify the visitor that the account is protected from
screen shot as shown in figure 8.
If the user want to control the process of allowing friend or public to save photo then an
option of allow saving would be added. Figure 8 illustrate this option.
To know the number of users that download the picture a button can be added for this
matter as shown in figure 10.
436
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
FIGURE 10. Notifying the user about the number of downloading picture
However, there are many other website which is similar to Facebook and Instagram where
they ask people to log in to their account to check new photos of their friends. When the user
opens these websites, it looks like a normal social media account such as Facebook. Then
after, the user enters the user id and password, without knowing that the account details are
being stolen by a hacker. In Instagram, if you have a public account, anyone can see your
images. With a private account, only your approved followers can see the photos and videos
you share. This option secures your picture from unauthorized users.
437
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
After locating the official page of the college, the page information was checked. The
result was that not all the provided information is correct as shown in figure 12.
FIGURE 11. Different copies of college of Engineering- Salahaddin University Facebook page
Nearly 60% of provided information from academic staff is fake. Some entered academic
title which is not correct. There are lots of irrelevant information about their background an
example is shown in figure 14. While this occurred less in employees profile (nearly 20%).
438
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
As it is shown from the chart, the proposed architecture provides accurate information
about the user that want to create account associated to his business. It is crucial that all staff
in collage identify themselves with correct information, so it is easy for their colleagues and
students to find them. This is also true for any other search engine. As a result, the provided
architecture guaranteed two main security aspects. First, when creating accounts related to
any company or governmental establishment, the authentication using ID will insure no fraud
account is created in the network related to the business, as well as, people related to this
account. This will insure all the news and announcements will all be authentic.
The differences between the
current and proposed architecture
120%
100%
80%
60%
40%
20%
0%
The Current Architecture The Proposed Architecture
Privacy Identical Personal Work Irrelevant Spam
Name Information Information Information
Figure 15. The differences between the current and proposed architecture
Second, the architecture will guarantee the accounts want to associate to the main business
account will all be checked and authorized by IT administrator. In this case, all data and
439
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
information will be kept private and less spam attacks will be guaranteed. In addition,
following the above techniques will prevent fraud and hacker to download another users
picture and pretend to be them. By following the techniques, the user can give permission to
people who know to download their pictures and create private account.
7. Conclusion
8. Acknowledgment
We would like to thank all who give us the permission to access their account and express
their fears of using social media. They inspire us to think deeply about writing a research
about providing secure privacy in social media network.
References
[1] Das B., Sahoo J. (2012) Social Networking Sites A Critical Analysis of Its Impact on Personal and
Social Life, International Journal of Business and Social Science Vol. 2 No. 14. www.ijbssnet.com
[2] Porter, J. (2008). Designing for the Social Web. Thousand Oaks, CA: New Riders Press
440
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
(201-211) , ISSN 1566-6379 201 Academic Publishing International Ltd Reference this paper as: available
online at www.ejise.com
[7] Dinerman B.,( 2011) Social networking and security risks, GFI White Paper.
[8] Hogben G.,(2007),Security Issues and Recommendations for Online Social Networks. ENISA,
October 2007 E. Retrieved from http://www.ifap.ru/library/book227.pdf
[9] Wyman B., Scrivens W., Hoffman P., Spitzner L.,(2013) Social Networking Safely Retrieved from
http://www.securingthehuman.org
[10] Kumar A., Kumar G., Rai A., Sinha S. (2013) Social Networking Sites and Their Security Issues
International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 ISSN 2250-
3153 www.ijsrp.org.
[11] Lessig, L. (2006). (2009). 4 reasons why e-records are still a mess. Federal Computer Week. Code 2.0.
New York: Basic. Lipowicz, A. Retrieved from: http://www.fcw.com/Articles/2009/03/09/policy-email-
records.aspx.
[12] Hansen, D. L., Shneiderman, B., & Smith, M. A. (2011). Analyzing social media networks with
NodeXL: Insights from a connected world. Burlington, MA: Morgan Kaufmann.
[13] http://www.ebizmba.com/articles/social-networking-websites
[14] Danielle S. (2013), Moving on from Facebook Using Instagram to connect with undergraduates and
engage in teaching and learning
[15] Lenhart A.,Madden M.,(2009), Teens, Privacy and Online Social Networks
. Retrieved from http://www.it.cornell.edu/policies/infoprivacy/definition.cfm
[16] Lenhart A., Amanda B., Madden B., Mary M.. (2007). Teens, privacy &online social networks.
Retrieved from http://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks/1-
Summary-of-Findings.aspx
[17] Gross, R. and Acquisti, A. (2005). Information revelation and privacy in online social
networks. Proceedings of WPES05 (pp. 7180). Alexandria, VA: ACM.
[18] Naaman M., Boase J., Lai C.-H. 2010. Is it really about me?: message content in social awareness
streams In CSCW.
[19] Hu Y., Manikonda L., Kambhampatihttp S., (2013) What We Instagram: A First Analysis of
Instagram Photo Content and User Types .Retrieved from : //149.169.27.83/instagram-icwsm.pdf
[20] Lewis J.,(2009) MI6 chief blows his cover as wife's Facebook account reveals family holidays, showbiz
friends and links to David Irving. Retrieved from http://www.dailymail.co.uk/news/article-1197562/MI6-
chief-blows-cover-wifes-Facebook-account-reveals-family-holidays-showbiz-friends-links-David-Irving.html
[22] Maloney-Krichmar, D., & Preece, J. (2005). A multilevel analysis of sociability, usability and
community dynamics in an online health community. Transactions on Human Computer Interaction, 12(2),
132.
441
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
T
oday patient management process which includes patient appointment, health
forms, health records, and priority calls is considered important because it
supports health care sector and reflect its quality. For the purpose of improving
442
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
health care sector, its imperative to look at the process of patient management such as time
management and how to make more efficient. The biggest part of complaints made by
patients are concerned with the longtime of waiting between patient arrival to a clinic and
the actual starting time of consultation. One of the main problems of patients is the lengthy
time during patient appointment reservation till the time of actual meeting with the related
doctor or consultation [1] [2]. Moreover, appointments periods are not systematized since
there are no fixed number of appointments per day, and patient might miss or forget
appointment date which lead to cancelation of appointment and repeating appointment
reservation process for new period if the patient asked again for appointment. Therefore
many patients are not satisfied with current traditional system of appointments, especially
those having urgent needs. This problem caused by missing of appropriate system that could
re-arrange appointments and remind patients about their consultation time to reduce raised
delay and number of missed appointments [3] . Figure 1 shows the current general flow of
patients appointment to the consultation hour in Kurdistan region, and this flow needs
improvement [4]. Usually, patient will visit or contact the dentistry secretary to book an
appointment then waits for that particular date and time of appointment. As soon as
appointment date is approached, patients need to fill in registration forms in arrival. Next,
from the time of registration till consultation hour, the waiting time of patients could be
separated into these two parts:
Patients earliness Period spent from early arrival till the designated appointment
time.
Internal waiting time Time of waiting for the queue before starting the
consultation hour.
443
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Appointment
Waiting Interal
Appointment or
Reservation Appointment waiting time
Confirmation Consultation
Time or Date
Time
Due to queue or
Request Geting dentist's delay
Appointment appointment date
and confirm it
The common process within dentistry or health clinics is based on first come, first
served system, where two available methods of getting a consultation :
A- Visit the dentistry on the appointment day and wait if any queue is there.
B- Call the dentistry on the appointment day and ask about the suitable time to come to
avoid any internal waiting time such as queues time.
For the last two decades, IT has made big innovations which become available to
organizations and people, together with the health sector. In the past couple of years, there
are significant developments in health sector to assure the performance quality and standards
effectiveness of healthcare and its services [5]. In [6] it is stated that the Internet generally
holds a big influence toward developing the healthcare system as compared to all other
technologies that been adopted a few years ago. Nevertheless, because of some struggle
related to guarding confidentiality of the patients records which hinder the greatest
expectation of the Internet in health sector.
To avoid burden of queues and manual hand reservation for appointments, scheduling
appointment via phone or messages (SMS) is considered one of the best solution. Regarding
the appointment scheduling no reminder system is there on all platforms for appointments
which have been affirmed by the dentistry secretary [7]. Our proposed system is designed
especially for public clinics as there is huge traffic on them with visitors and the appointment
is not the same day, so they will be asked to comeback in few days ,and sometimes there will
be misunderstanding and patients forget the exact day. That is why we have designed the
reminder system specifically for clinics especially dentistry.
444
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
This paper organized as follows. Part 1 introduction about patient smart notifying system,
then Part 2 which state some literature about IT utilization in the health industry concerning
patient appointment. Part 3 shows the architecture of the proposed smart patient notifying
system, followed by part 4 on the implementation of our recommended system and its
operation. Part 5 provides the conclusion plus some future work.
2. LITERATURE REVIEW
In this section we are going to explore in brief on the adoption of various systems for
patients reminder on their appointments in health sector.
445
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
as phone, ID, credit card numbers, and etc. As this system is a web-based, these sensitive
data can be stolen by hackers. Another issue, most of the scheduling appointment and online
registration system require monthly payments to the provider. Thirdly, some online
appointment systems are restricted to less noticed symptoms such as vomiting, abdominal
pains, and diarrhea [5]. Therefore when some of the symptoms are not available on the web
system, patients must call in for any available appointment periods and be waiting for
confirmation. For these urgent situations of needing consultation, this inadequacy might be
leading to troubles for healthcare staff and patients. Lastly, this system does not offer any
prioritization for scheduling the appointments. Nonetheless, it has been noticed to have such
shortcomings and ineffectiveness to the online system. Firstly, reserved patients have to show
their consultation cards which fixed with barcode for scanning to inform attendance. The
inconvenience will appear once the card unintentionally mislaid, then inpatients are to be
entered as an outpatient instead. Furthermore, in the emergency case, the patient is obligated
to book physically at whatever clinic or by calling in and waiting for the confirmation by
registrar for attainable periods. Another case arise if an interruption of consultation happened
because of delay to access to the electronic web system. To access records of a patient, one
must set and present his/her ID to the registrar. As a final point, priority levels might be set
manually by depending on status of registration and age, regardless the illness level. At this
time, there is no enough research accessible in the improvement of prioritization in any health
care clinics throughout the world [10]. However our proposed electronic system will deal
with urgent cases and priority levels by and will not have a problem with slow access to the
system because only one person (registrar) or administrator will create the records for the
patients.
446
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
nevertheless of clinics nearby. Finally, there are no automated system calls as a reminder
before the scheduled date. Our proposed reminder system will tackle these issues by sending
SMS automatically to patients based on the data entered by the administrator or clinics
secretary.
3. METHODOLOGY
The aim of designing appointment reminder system is to reduce waiting time and make
scheduled appointments well-arranged by setting fixed number of appointments per-day. The
reminder system will be able to send reminder SMS to patients one day before the
consultation, by fixing the number of appointments per day so each day will have a group of
patients and their number can be set by the clinic administrator or doctors secretary.
Regardless of deep research from previous work in enhancing operations of healthcare, some
problems are still unsettled. There are still concerns for walk-in patients; sometimes they
must wait for a long time to reach their turns. Patient may schedule the appointment; but,
they still need to wait for their appointment to be affirmed by administrator of a clinic. The
process of waiting for scheduled appointments may take weeks or even months for any
available periods. Both of the mentioned scenarios are not appropriate for all parties: patient,
healthcare personnel and the healthcare clinic. This proposed reminder system would help as
a queuing system to access patients appointment information which will alert patients before
12 hours of the actual appointment by an SMS message. This system focusing only on the
basic outpatient standard system such as registration, and scheduling appointment. Figure 3
below shows the proposed system layers.
Layer 2: Server
Patients Phones
For the purpose of creating the system that we proposed to remind patients on their
appointments, the researchers have developed the system by working on these four layers:
447
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1- User interface: this is considered the first step of using the system and it is represented
by a web-based screen. This screen will enable the user whether he/she is an admin
or a secretary to enter the data of the patients, figure 2 is a snapshot of this screen.
2- Server: This is a web server which host our web-based application to make available
for users which are admins and secretaries of clinics. We a host on a public server
which supports our web application.
3- Database server: this layer is responsible for saving all the data of the patients, so the
proposed system can use these data to automatically remind the patients on their
appointments before a specific number of hours. However, next layer (database
distributer) will work on notifying the potential patients.
4- SMS distributer: The main job of this layer is to send notifications to the patients
through SMS messages which is considered one of the most efficient way of
communication these days especially in rural areas where internet service is still
rarely used. This layer or service will utilized with Korek Telecom Bulk message,
because its the most popular telecommunication network in Erbil city of Kurdistan
region and most of the patients are clients with Korek Telecom.
448
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
After the system has been implemented, its database is connected with a GSM company
using SMS distributer so that through Bulk messages, the notification message is sent to
patients based on the information presence in the database about the date and phone number
of the patient.
As it can be seen from figure 4, the secretary will be filling out a form containing all
required information on the patient specially the name and phone number. The form is
validated such that the user should fill all the fields. As soon as the form filled out, the data
will be stored on a public server on the internet. The database is connected to SMS distributer.
When the day of the appoint approaches, the patient will receive a notification message as it
can be seen in figure 5.
Besides having internet-less notifications to patients, hospital visitors can access online
web page and search for their appointment by Name, visiting Date and Phone number. The
figure 6 shows that, using our web based application, the secretary can search for patients
too.
449
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
As it can be seen from figure 7, the patient will receive a bulk message from the GSM
Company about the appointment before 12 hours. Through this way the appointment missing
rate will be reduced and patients arrive to the hospital on exact date and time.
After the application implemented, we connected it the appointment database with Korek
Telecom using SMS distributer. We subscribed to Korek GSM using 2000 Bulk messages.
The application installed on the secretary work station and put under test for one week.
After seven days, the opinions on the application and the solution provided for appointment
procedure from several personals who used the system.
The general director of the Shaqlawa believes that the solution will reduce the
appointment problems to a great extinct which were causing troubles before. He thinks that
the application is very suitable for a place like Shaqlawa city since around %50 of people
dont have internet access or they dont know how to use the internet.
The general director of the hospital says that from now, our data is saved in a safe place
and we can retrieve it whenever needed in a very easy way. He believes that this system will
reduce the cost of paper in future.
The Doctors mentioned that the application have had the troubles facing with wrong or
missed appointment being solved. Doctors found the search feature for patients very useful
to know the number of patients they are going to treat in an exact day.
The secretaries believe that this system will reduce the force, work and miss-
understandings between patient and hospital in appointment issues.
The patients look comfortable with the system since they get the notification in a very
convenient way without having concern on internet and emails plus a correct day for
treatment.
450
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. CONCLUSIONS
1. The missing appointments by the patients due to the long queues considers the real
main problems arise in hospitals.
2. Using the proposed appointment management system, the percentage of missed
appointments by patients is decreased tremendously as most of the population in rural
areas have mobile devices regardless being a smart phone while no need for internet
access and knowledge on using the internet.
3. During this research, it is found the proposed SMS distributer based appointment
system is the optimal and the most efficient way to remind patients about their
appointment regardless having internet access such as in rural areas.
4. Using this system helps the clinics' secretary to manage the workflow of appointments
since the system can specify fixed number of daily appointments then remind them
automatically via SMS.
6. REFERENCES
]1[ F. P. Mardiah and M. H. Basri, "The Analysis of Appointment system to reduce
outpatient waiting time at Indonesias public hospital," Human Resource
Management Research, vol. 3, no. 1, pp. 27-33, 2013.
]2[ Z. Zhu, B. H. Heng, and K. L. Teow, "Analysis of factors causing long patient
waiting time and clinic overtime in outpatient clinics," Journal of Medical Systems,
vol. 36, no. 2, pp. 707-713, 2012.
]3[ A. Aeenparast, S. J. Tabibi, K. Shahanaghi, and M. B. Aryanejhad, "Reducing
outpatient waiting time: a simulation modeling approach," Iranian Red Crescent
Medical Journal, vol. 15, no. 9, pp. 865-9, 2013.
]1[ C. R. Anthony, M. L. Hansen, K. B. Kumar, H. J. Shatz, and G. Vernez, "Building
the Future: Summary of Four Studies to Develop the Private Sector, Education,
Health Care, and Data for Decisionmaking for the Kurdistan RegionIraq (with
Arabic-language version)," Rand Health Quarterly, vol. 3, no. 2, 2013.
]8[ Y. Symey, S. Sankaranarayanan, and S. N. binti Sait, "Application of smart
technologies for mobile patient appointment system," International Journal, vol. 2,
no. 4, 2013.
]7[ R. S. Sadasivam, R. L. Kinney, S. C. Lemon, S. L. Shimada, J. J. Allison, and T. K.
Houston, "Internet health information seeking is a team sport: analysis of the Pew
Internet Survey," International journal of medical informatics, vol. 82, no. 3, pp.
193-200, 2013.
]6[ W. Cao et al., "A web-based appointment system to reduce waiting for outpatients:
A retrospective study," BMC health services research, vol. 11, no. 1, p.2711 ,315 .
]5[ T. K. Al Hilfi, R. Lafta, and G. Burnham, "Health services in Iraq," The Lancet, vol.
381, no. 9870, pp. 939-948, 2013.
]6[ L. R. LaGanga and S. R. Lawrence, "Service Appointment Scheduling with Walk-
In, Short-term, and Traditional Scheduling," in Decision Sciences Annual
Conference, 2008.
]17[ D. Gupta and B. Denton, "Appointment scheduling in health care: Challenges and
opportunities," IIE transactions, vol. 40, no. 9, pp. 800-819, 2008.
451
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
I
n every wireless networking environments in today's abundant use of communication
devices, nodes communicate by two methods either shortly with their planned
communication partner or in the form of base stations which is called networking
infrastructure as well as a backbone network. Example, the using 802.11 in ad hoc networks,
shows the components also the networks inside the Wireless Network Infrastructure. The
self-organizing network which is Mobile ad hoc network (MANET) its established
automatically via wireless connections by a combination of portable nodes without the
452
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2. SECURE ROUTING
Protected routing protocols overcome malevolent nodes that be able to obstruct the
accurate operation of a routing protocol by adjusting routing information, via imitating
other nodes and by inventing false routing information. This Protected routing protocols
of ad hoc networks are either combinations of security mechanisms within the existing
protocols or entirely novel independently protocols. In general, the proposed secure
routing protocols was classified into two classes, routing protocols which use hash chains
and routing protocols that require predefined dependence relationships in order to operate
[1].
453
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Basic of Chaotic Systems Properties its designed via few simple function f
which is repeated on som set X. Especially, the maping f: XX is sid to be
chatic on X if
o Periodic points are thick in .
o f is topologically transitive;
o f has sensitive reliance on initial conditions;
In intuitive way, a map owns sensitive reliance on primary situations if there exist
points arbitrarily near to x which finally separate from by at least > 0 under
repetition of f, while a topologically transitive map has points that ultimately
transfer in repetition from one random minor neighborhood to any other [4].
In this paper, we presented a survey for secure routing and proposed secure routing based
on Paillier public key for encrypt and decrypt the Message and also used DSR to remove
these malicious nodes, and minimum span tree for routing path are used. The following
are some of the routing protocol discussed.
454
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The importance connectivity of the local mobile node makes each mobile node uses
multiple techniques to become more aware of neighboring nodes, one of these technique
includes local broadcasts known as hello messages (not system-wide). The routing tables
are designed to optimize response time of the nodes within the neighborhood to local
movements, and due to the requests of new routes, this technique provides fast response
time. The primary objectives of the algorithm are:
Discovery packets were broadcasting when it needed only.
To differentiate between management of local connectivity and maintenance of
general topology.
To distribute information to mobile nodes that needs the information about
changes in local connectivity.
455
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2.3. A Novel Method to Improve Life of Network for Secure Routing Protocol
The procedure for of working start in login to account (for new user create an account)
after this authenticate it by username, password and secret question to authorize. Then
generate path step and choosing file /data to encrypt file/data by using Advanced
456
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Encryption Standard (AES) algorithm and send it to the desired node through selected
path. At the destination node, the user verifies whether the received data for reliable/pure
or malicious if data after verification goes to reliable the data is pure otherwise, data is
not pure (The intruder is attacking data). Recognize the attack data and reject it and
finally negative acknowledgment sent to the source [10]. The following pseudo code of
the algorithm:
1. Start and login process
2. if register then login and authenticate and authorized
3. Else create a count and repeat step 2.
4. generate secure path.
5. send file (encrypted file) at source and receive file (decrypt
file) at destination
6. verifies data (if pure data ) its save it
7. Else identify the node that send data by vampire attack.
8. reject data and send negative acknowledgement to the source.
457
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
From network viewpoint, an opponent may interrupt all the essential information, if all
message follows a single route to its destination, to retrieve that message with
compromising any node on the route [11]. With the SPREAD scheme, excepting the
destination and source nodes, the opponent should conciliation some nodes inside
network on a number of independent routs to find the least required (T) shares.
Considering the multipath routing and the scenario of (3, 3) secret sharing as shown in
Figure3.
458
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Type Techniques
Routing Disadvantag
Name Routing advantage
protocols e
protocol
capable of Gets single path
both unicast from the available
funded path, and reduce the increase
and
the source sends all control traffic latency in
AODV REACTIVE multicast
its packet through message finding new
routing with
this one funded overhead. routes.
loop free
path.
routes
459
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
460
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Discover malicious
Malicious node
nodes during route
detection
protocol process using
DSR
Encryption process
461
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
establishes this network by connecting a group of portable node in the wireless ad hoc
network. the process of calculating minimum span tree shown in Figure 6 [14].
Decoder
Encoder
Seed for Secure Block
Block Seed for
logistic channel
logistic
function function
462
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
attacks. Efficiently finds short and secure route to the destination. A secure ad hoc network
has to meet different security requirements. First privacy concerns require Confidentiality in
the use of data. Second Encryption and Decryption by using chaotic cryptosystem is one of
the mechanisms used to enforce confidentiality. Third the integrity of data (cipher text) arise
to destination must not be modified by maliciously only the authorized user can be decrypted
and recover the original data. Fourth the data compression is also an issue for several reasons
in Authentication and Non-repudiation refer to the inability to deny the performance of some
action falsely. The DSR scheme is depends on the idea to distribute a secret through multiple
independent paths while it is transmitted across the network.
6. REFERENCES
[1] Dongbin Wang, Mingzeng Hu and Hui Zhi, A survey of secure routing in ad hoc
networks, The Ninth International Conference on Web-Age Information
Management, 2008 IEEE.
[2] S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehaviour in
Mobile Ad Hoc Networks", Mobile Computing and Networking. (2000), pp., 255-
265.
[3] Yipin Sun, Rongxing Lu, Xiaodong Lin, Jinshu Su and Xuemin (Sherman) Shen,
NEHCM: A Novel and Efficient Hash-chain based Certificate Management Scheme
for Vehicular Communications.
[4] F. Bevitelli, E. Di Cola, L. Fortuna and F. Itnlia, Multilayer Chaotic Encryption for
Secure Communications in Packet Switching Networks , Communication
Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on 21-
25 Aug. 2000
[5] CHARLES E. PERKINS, ELIZABETH M. ROYER, AD-HOC ON-DEMAND DISTANCE
VECTOR ROUTING, MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 1999.
PROCEEDINGS. WMCSA '99. SECOND IEEE WORKSHOP.
[6] Parul suneja , Anil Kumar and Annu Soni , System scenario based investigation of
AODV and AOMDV Routing Protocol in MANET , 2015 International Conference
on Soft Computing Techniques and Implementations- (ICSCTI).
[7] Sunita Gupta and Ghanshyam Prasad Enhanced load balancing and delay
constraint AOMDV routing in MANET, 2016 Symposium on Colossal Data
Analysis and Networking (CDAN).
[8] Sukiswo and Muhamad Rifqi Rifquddin ,Performance of AOMDV Routing Protocol
Under Rushing and Flooding Attacks in MANET, 2015 2nd International
Conference on Information Technology, Computer, and Electrical Engineering
(ICITACEE)
[9] Vipin Bondreand Sanjay Dorle Design and Performance Evaluation of AOMDV
Routing Protocol for VANET , IEEE International Conference on Computer,
Communication and Control (IC4-2015).
[10 ] Sunil Bhutada, ranthi Kumar.K,Manisha.K, A Novel Approach for Secure Routing
Protocol: To Improve Life of Network, International Conference on Contemporary
Computing and Informatics (IC3I), 978-1-4799-6629-5/14 2014 IEEE.
463
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
464
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
465
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
INTRODUCTION
RELATED WORKS
Aziz and Yosof [1] proposed a classification model to analyze graduates employment. They
employed different algorithms like J48, k-Nearest Neighbor (KNN), Multilayer perception,
Logistic Regression and Naive Bayes. They found that logistic regression resulted in highest
accuracy 95.2%. Balle and Lisboa [2] focused on machine learning methods and models of
data mining. They include monograms, rule induction, graphical models, and data
visualization. Minh, Hue, Dzung, and Toan [3] made a simulation study of equity valuation
model. Langone et al. [4] proposed a machine learning method known as Least Squares
Support Vector Machine (LS-SVM) for fault detection online with industrial machine data.
It is supervised learning method, which helped to know early detection and classification of
faults.
Claesen et al. [5] proposed a supervised learning model using SVM. The model makes use
of positives and unlabeled objects. It actually makes use of an ensemble of SVM models in
order to have an intuitive approach for appropriate learning model. It has features like
supervised learning, positive and unlabeled learning, and learning with false positives. Frandi
et al. [6] propose another SVM classification approach along with an algorithm for large-
scale benchmark data classification. Alaiz et al. [7] proposed a graph based classification
method for robust classification of data presented in the form of graphs. Chae et al. [8]
proposed a data mining approach known as feature selection for intrusion detection using
NSL-KDD dataset. They used the concept of information gain and gain ratio. Chen et al. [9]
emphasized the need for considering big data and big data eco-system for many real time
enterprise applications.
466
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Huang et al. [10] proposed an SVM based classifier known as pin-SVM for finding pinball
loss in SVM. Mehrkanoon et al. [11] proposed a semi-supervised algorithm that is based on
kernel spectral clustering. Kernel here holds prior knowledge about labels. Drumetz et al.
[12] focused on dimensionality estimation algorithms for finding intrinsic dimensionality in
datasets.
Olaiya and Adeyemo [13] investigated the utility of data mining techniques for predicting
weather information like wind speed, evaporation, rainfall and maximum temperature. They
used two algorithms namely decision tree and artificial neural network for achieving this.
They found the usefulness of data mining techniques for weather forecasting and study of
climate changes. Krishna [14] reviewed many weather forecasting models available. They
include models based on classification techniques, clustering techniques, and artificial neural
networks. Schmidhuber [15] made a review of data mining techniques that are used for deep
supervised and unsupervised learning. Especially they focused on neural networks. Cortest
et al. [16] proposed a framework known as AdaNet for analyzing artificial neural networks.
The framework followed adaptive structural learning. Siddiqui and Muhammad [17]
performed clustering based data mining operations on KDD Cup 99 dataset. They used k-
Means clustering algorithm provided by Oracle Data Mining tool.
Schubert et al. [18] proposed a methodology for clustering uncertain data. Uncertain data is
the data which has some noise and the data is not precise. They used a general framework to
cater to the needs of analysis of uncertain data. They named the framework as ELKI which
has many implementations of algorithms that made use of distance measures, pruning
techniques, visualization components and evaluation measures. Agrawal and Gupta [19]
explored usage of C4.5 algorithm with certain optimization for healthcare domain with
additional rules. They studied the difference between classification functionality of original
C4.5 and an optimized C4.5 in terms of efficiency and complexity. Denoeux et al. [20]
explored a rule known as evidential K-nearest neighbor rule for making a clustering
procedure. Their procedure is named as EK-NNclus, which takes scale parameter and k of
neighbors. In addition, it does not need the number of clusters to be generated. It was able to
get both model-based and density-based procedures with having knowledge of number of
clusters priori. Sanghavi et al. [21] explored three kinds of algorithms related to feature
selection. They are known as Filter, Wrapper and Embedded. They built logistic regression
algorithm in order to identify disease with medical data mining. In this paper a framework is
proposed to explore data mining algorithms and produce a prediction model ultimately using
linear regression technique. The proposed model shows that such climate can be predicted
using the data mining techniques considering the error rate calculations. Therefore, this work
filled those gaps, which it has been conducted to gather fifth different tools into a model
includes cluster, classification and regression techniques. The proposed model shows the
comparison evaluation results that obtain by the model execution. It is simply give clear
results of all used techniques and guide the user, which one will be the most suitable tool
according to the nature of work.
467
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
PROPOSED METHODOLOGY
In this paper, we proposed a methodology for the exploration of data mining algorithms for
prediction of wind velocity parameter of climate dataset. In other words, the methodology
throws light into building various models using different data mining techniques. The
methodology takes climate dataset as input and performs training phase, so as to get training
data ready for exploration of different classification algorithms. The data mining algorithms
used in the exploration of the models include kNN, Neural Networks, J48, SVM, and linear
regression. The methodology is illustrated in Figure 1.
468
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
for all algorithms in the next section. Error rate is computed for all algorithms to know
prediction accuracy of different algorithms.
EXPERIMENTAL RESULTS
A Dataset that contains weather data with attributes is taken as a case study for this research
work. First column of the file is station number, every station represents a Turkish city which
is five stations. These cities chosen by their geographical position and include INEBOLU,
SINOP, AMASRA, SILE and AKCAKOCA. Every station place is near the sea. So that their
wind potential is higher than other places. All data are obtained from the Turkish
Government Meteorology Services for summer months of 2013.
The wind potential of a place is related with geographical position, humidity, atmospheric
pressure and the ambient temperature. All of these are datasets parameters. And it has 456
instances covering data of five stations for summer months. An excerpt of the dataset is
shown in Table 1. Weka is the environment used to explore a climate dataset that is very
useful and the mining of such data provides useful information to various domains in the
world. Weka tool is used to exploit all existing methods. Apart from Weka, the environment
includes JDK 1.7 (Java programming language), Net Beans 7.2 (Integrated Development
Environment) are used in Windows platform. JDK is used to have basic tools like compiler,
application launcher and Java language support. Net Beans is used to have rapid application
development as it supports developing applications faster. Weka is integrated with Net Beans
in order to reuse existing methods and other support functionality like loading files, viewing
data and results. Swing API in JDK is used to have Graphical User Interface (GUI) while
java.io package is used to work with input and output files. Different kinds of data mining
techniques as presented in Figure 1 are used to perform mining on given dataset. The dataset
is related to climate data that were captured in a one of the region in Turkey within first
fifteenth days of the June. The attribute of pressure, Humidity and temperature and actual
wind speed resented in the datasets. To predict the wind velocity using all datamining
techniques the data inputted into the proposed model. In supervised simulation the predefined
classes achieved through a training phases of the existing datasets. In NN phase, the
backward propagation used based on excerpt of dataset is presented in Table 1 (except the
last column which is the predicted wind velocity using Linear Regression), which is used as
input to the proposed framework.
As shown in Table 1, it is evident that the input dataset contains different attributes like
station number month, day, and pressure, humidity, and temperature. The proposed
framework is applied to have training samples and different models. All these experiments
are done using Weka, which is one of the widely used data mining tools.
TABLE 1: An excerpt from generated output of Regression
Station Pressure Humidity Temperature
Month Day Wind Velocity (m/s)
Number (hPa) (%) (oC)
1 6 1 1008.7 67.7 19.7 19.52310330013237
1 6 2 1005 80.3 19.6 19.60674819378439
1 6 3 1010.1 69.3 17.3 19.69039308743642
469
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Actual
Station Predicated Wind
Month Day Wind Error Rate
Number Velocity (m/s)
Velocity
1 6 1 17.4 19.52310330013237 12.2017
470
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
As presented in Table 2, the results show the actual wind velocity and predicted wind velocity.
Error rate is computed as follows.
Error Rate= (Predicted Wind Velocity-Actual Wind Velocity)*100/Predicted Wind Velocity (or)
Error Rate= (Actual Wind Velocity - Predicted Wind Velocity)*100/Predicted Wind Velocity
Error rate is presented in the last column of the Table 2, which reflects the difference between
actual wind velocity and predicted wind velocity. In the same fashion, the results of other
algorithms are presented as follows.
TABLE 3: Error rate for kNN
Actual
Station Predicated Wind
Month Day Wind Error Rate
Number Velocity (m/s)
Velocity
471
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Actual
Station Predicated Wind
Month Day Wind Error Rate
Number Velocity (m/s)
Velocity
1 6 1 17.4 15.466 11.11494
1 6 2 15.2 15.723 3.44079
1 6 3 15.5 16.12 4
1 6 4 15.5 16.35 5.48387
1 6 5 15.8 16.58 4.93671
1 6 6 18.2 15.95 12.36264
1 6 7 16.6 17.26 3.9759
1 6 8 15.5 16.58 6.96774
472
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Actual
Station Predicated Wind
Month Day Wind Error Rate
Number Velocity (m/s)
Velocity
1 6 1 17.4 13.46 22.64368
1 6 2 15.2 13.72 9.736842
1 6 3 15.5 14.25 8.064516
1 6 4 15.5 14.35 7.419355
1 6 5 15.8 14.58 7.721519
1 6 6 18.2 14.35 21.15385
1 6 7 16.6 15.25 8.13253
1 6 8 15.5 14.68 5.290323
1 6 9 19.4 15.28 21.23711
1 6 10 19.1 15.45 19.10995
1 6 11 18.4 15.85 13.8587
1 6 12 17.2 16.12 6.27907
1 6 13 15.9 16.05 0.9434
1 6 14 16.2 16.35 0.92593
1 6 15 18.4 16.15 12.22826
473
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Actual
Station Predicated Wind
Month Day Wind Error Rate
Number Velocity (m/s)
Velocity
1 6 1 17.4 13.56 22.06897
1 6 2 15.2 12.78 15.92105
1 6 3 15.5 12.25 20.96774
1 6 4 15.5 12.35 20.32258
1 6 5 15.8 12.58 20.37975
1 6 6 18.2 14.12 22.41758
1 6 7 16.6 13.54 18.43373
1 6 8 15.5 13.24 14.58065
1 6 9 19.4 15.86 18.24742
1 6 10 19.1 14.75 22.77487
1 6 11 18.4 14.76 19.78261
1 6 12 17.2 13.89 19.24419
1 6 13 15.9 13.95 12.26415
1 6 14 16.2 13.98 13.7037
1 6 15 18.4 14.86 19.23913
As shown in Table 3 through Table 6, the results of different algorithms such as kNN, J48,
SVM and neural networks are presented along with the error rate in wind velocity prediction.
TABLE 7: Error rate for all methods
Average Error
Method Name
Rate
KNN 10.349264
J48 7.1644882
SVM 10.98300233
Neural
18.68987467
Networks
Linear
19.33040933
Regression
In addition, Table 7 shows the average error rate of all instances for each method is
computed. The results revealed the performance of different methods for predicting wind
474
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
velocity. The results stated that J48 obtained the lowest error rate while Linear Regression
got the biggest average of the error rate. Likewise, the error rate of other used techniques are
shown in the table 7.
REFERENCES
[1] Mohd Tajul Rizal Ab Aziz and Yuhanis Yusof , Graduates Employment Classification
using Data Mining Approach", ICAST, pp. 1-8, 2016.
[2] Vanya Van Belle and Paulo Lisboa. Research directions in interpretable machine
learning models. ESANN, pp. 533-541, 2013.
[3] Nguyen Dang Minh and Nguyen Thi Minh Hue , Equity valuation model of vietnamese
companies in a foreign securities market a simulation approach, IEEE, vol. 66, pp. 1155-
11, 2012.
[4] RoccoLangone , CarlosAlzate , BartDeKetelaere , JonasVlasselaer , WannesMeert and
JohaA.K.Suykens,LS-SVMbasedspectralclusteringandregressionforpredicting
maintenanceofindustrialmachines, Elsevier Ltd, vol. 37 , pp. 268-278, 2014.
[5] Marc Claesen, Frank De Smet, Johan A. K. Suykens and Bart De Moor, Arobust
ensemble approach to learn from positive and unlabeled data using svm base
models. neurocomputing, SI on Advances in Learning with Label Noise, pp. 1-34, 2014.
[6] Emanuele Frandi, Ricardo anculef and Johan A. K. Suykens, A partan-accelerated
frank-wolfe algorithm for large-scale svm classification, pp. 1-19, 2015.
[7] Carlos M. Alaz, Michael Fanuel and Johan A. K. Suykens. Robust classification of
graph-based data , pp. 1-8, 2016.
[8] Hee-su Chae, Byung-oh Jo, Sang-Hyun Choi and Twae-kyung Park, Feature selection
for intrusion detection using nsl-kdd, isbn, pp. 184-187, 2013.
475
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
[9] Min Chen , Shiwen Mao and Yunhao Liu. big data, A Survey.Springer, vol. 19 , pp.
171-209, 2014.
[10] Xiaolin Huang, Lei Shi, and Johan A. K. Suykens. Solution path for pin-svm classifiers
with positive and negative values, pp. 1-10, 2012.
[11] Siamak Mehrkanoon and Johan A. K. Suykens. Non-parallel semi-supervised
classification based on kernel spectral clustering, pp. 1-8, 2014.
[12] Lucas Drumetz, Miguel Angel Veganzones, Ruben Marrero, Guillaume Tochon, Mauro
Dalla Mura, Giorgio Licciardi, Christian Jutten and Jocelyn Chanussot, Hyperspectral
Local intrinsic dimensionality, HAl, pp. 1-16. 2016.
[13] Folorunsho Olaiya and Adesesan Barnabas Adeyemo . (2012). Application of Data
Mining Techniques in Weather Prediction and Climate Change Studies . Information
Engineering and Electronic Business, p51-59.
[14] G.Vamsi Krishna (2015) A Review of Weather Forecasting Models-Based on Data
Mining and Artificial Neural Networks 06 , p214-22.
[15] Jurgen Schmidhuber,Deep learning in neural networks: an overview, pp. 1-88, 2014.
[16] Corinna Cortes, Xavi Gonzalvo and Vitaly Kuznetsov, Adanet: adaptive structural
learning of artificial neural networks, pp. 1-20, 2016.
[17] Mohammad Khubeb Siddiqui and Shams Naahid, Analysis of kdd cup 99 dataset
using clustering based data mining, International Journal of Database Theory and
Application, vol. 6, (1-5), pp. 23-34, 2013.
[18] Erich Schubert, Alexander Koos and Tobias Emrich , A framework for clustering
uncertain data , pp. 1976-1979, 2012.
[19] Gaurav L. Agrawal and Hitesh Gupta, Optimization of c4.5 decision tree algorithm
for data mining application International Journal of Emerging Technology and Advanced
Engineering, vol. 3, (1-3), pp. 341-345, 2013.
[20] Thierry Denoeux, Orakanya Kanjanatarakul and Songsak Sriboonchitta, Ek-nnclus:
A clustering procedure based on the evidential k-nearest neighbor rule, pp. 1-39, 2016.
[21] Dhaval Sanghavi, Hitarth Patel and Sindhu Nair, Logistic regression in data mining
and its application in identification ofdisease, International Journal of Current
Engineering and Technology , vol.4, (1-6), pp. 3837-3839, 2014.
476
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Digital Watermarking,
Image Watermarking
1. Introduction
T
he threats of copyright are grown up on the owner's mind, so they always try to
secure their data from these threats by merging the owner ID with digital media.
This process is called Watermarking; the proof of ownership is done by extracting
the owner ID from the digital information file.
The protection of ownership of digital information becomes important concerns with the ease
of editing and reproduction. Digital watermarking, a scheme to embed special labels in
digital sources, has made considerable progress in recent years. There are several categories
of watermarking schemes [1]. Watermarking can be robust or fragile. In robust watermarking
technique, the modification to the watermarked content will not affect the watermark. But
fragile watermarking is a technique in which watermark gets destroyed when watermarked
content is modified or tampered with [2].
An effective authentication scheme should have desirable features that the embedded
authentication data is to be invisible under normal viewing conditions; and to allow the
watermarked image be stored in lossy compression format.
477
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In other hand, the patent must be registered to save the owner rights. The registration itself
means a patent protection. Although patent registration protect the intellectual rights, some
patent can't be registered like cars company industrial secrets, military weapon industries,
secure communication applications and techniques, ..,etc.
Besides, the ideation in some fields can't be protected from being stolen like literatures and
arts. Therefore a new concept or type of watermarking is needed.
In this paper, a new concept is discussed for watermarking any type of information
files with the condition that the size of the watermarked file must be greater than the size of
the logo file in mostly small ratio.
2. Image Watermarking
Watermarking must have four properties to reach its goal they are:
a) Effectiveness
b) Host signal Quality
c) Watermark Size
d) Robustness
Effectiveness means the watermarking process must be detective. The second property
insures that watermarking process will minimize the host changes. The third property
provided that the watermarking should be of minimum size. The robustness property is to be
withstanding against threats [4].
3. Applications of watermarking
a. Copy Protection: this is done by integrating the copying device with the
watermarking detection.
478
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
by watermarking.
4. Watermarking models
479
Figure 1. The communication-based model
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. Types of watermarking
480
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
The idea behind the proposed method is to take the logo file bit by bit
and looking for the equivalent bits in the watermarked file and storing the
positions in another separate file, so it is not a hiding operation therefore the
hidden file will be called logo file and the cover file will be called the
watermarked file.
For example the logo byte in figure 2, need to be located in two bytes of
the watermarked file.
0 1 1 0 0 1 1 1 Logo byte
0 0 1 0 0 1 0 1 1 0 0 1 0 0 1 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 watermarked content
The first bit of the authority byte is located in the first location in the
cover file, the second is located in location number 3, the third bit in location
six, and, so on the last bit of the hidden byte is located in location number 16.
These locations must be stored in a secret file to be retrieved in the extraction
operation.
The locations file is written in a special new designed format called the
Secret Watermarking File (SWF). Each location in SWF is represented by two
481
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
bits which explain the difference between each two adjacent locations. The first
two bits represent the location of the first bit of the logo file in the watermarked
file, the second two bits represent the difference between the second location
and the first, the third two bits represent the difference between the third
location and the second, and so on the ith two bits is the difference between the
ith location and the previous location.
1 0 1 logo bits
0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Watermarked file
00 11 01 00 00 10 SWF
482
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
SWF file must be securely stored in the owner database or any reliable
application to be used in the extraction process. As in the previously discussed,
SWF contains the locations of the logo file contents (bits) in the watermarked
file, and once getting SWF the user can retrieve the logo file from the
watermarked file.
483
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
file. RTP will save the name of the owner and send an index number to the
owner which must kept for future watermarking proof as shown in figure 4. The
index number represents the index of information SWF in the RTP database.
The smaller authority number will win the ownership of specific digital
information if it has more than one index number.
Anyone has to send the original information file and its authority number to the
RTP to prove his ownership of this information. ATP saving other extra
information to prove the sender is the owner of the authority number.
RTP .
.
SWF .
Database ANi: namei, swfi
ANi+1: namei+1, swfi+1
Server .
.
.
Anyone has to send the original information file and its index number to
the RTP to prove his ownership of this information. RTP saving other extra
information to prove the sender is the owner of the index number.
8. Evaluations
484
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
show that the size of the information file must be greater than the double of the
logo file size. This condition can be easily performed by extending the size of
the information file by repeating the information or by inserting some remarks.
o RTP must be one of the greatest companies in the world like Google,
Yahoo... etc. because it is reliable, well-known and has infrastructure enough
to perform this authentication method.
o The method is called "Unbreakable" because it looks like a document
registration in a secure place (RTP), and breaking the method means attacking
RTP.
o By using this method anyone can authenticate any unnecessarily
published or secret information.
9. References
485
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
486
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1. INTRODUCTION
N
etwork coding (NC) is a new technique proposed by Ahlswede et.al.[1] to maximize
the throughput of multicast networks. The main idea behind NC is to allowing
intermediate node to encode the incoming data and generates a new encoded packet.
This technique is different from the traditional networking which is capable of
duplicating and forwarding only. NC has various applications in computer networks, such as
wireless networks and P2P systems. Network coding produces new challenges of security,
for example, the pollution free problem, where no receiver can be reached by a source it does
not need. If the pollution does not detected as early as possible, the pollution will grow up
487
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
since the polluted messages could be used by all down-stream nodes, this kind of pollution
will prevent the sink nodes from recovering the source messages correctly.
2. Literature review
Many attempts have been done to overcome this problem. In [2], the pollution problem of
network coding is solved by using a network of tagged pipes; where each link is partitioned
into tagged pipes and each tag is a subset of the source messages. The packets outflowing in
each pipe can only be a function of the sources mentioned in the tag. Authors in [3] can detect
or filtered the polluted messages in sink nodes only. The work in [4] presents a security
scheme for network coding that reduces the cost of verifying blocks on-the-fly while
preventing the probing of malicious blocks. Digital signature, which is adopted in this work,
is used to prevent this problem. The source node generates its own signature and attached it
to the messages, the intermediate nodes check whether this signature is valid or not. The
source node needs only to transmit its secret key to the intermediate nodes in order to
regenerate a signature after packets being network coded.
3. INFORMATION SECURITY
In any information security system, there are several objectives need to be achieved by
the system itself. If any of these objectives is absent; there will be a defect in the system and
will not function properly [5]. RSA signature, by itself, can achieve these objectives. Some
of these objectives which are achieved by the proposed system are listed below:
TABLE 1: ACHIEVED OBJECTIVE IN PROPOSED SYSTEM
confidentiality Only authorized persons can access the secret information.
data integrity Ensuring information has not been changed during the transmission.
Message authentication
It ensures that the sender is the real one, not other person claiming.
4. DIGITAL SIGNATURE
A cryptographic process which is considered as the backbone in message authentication,
authorization, and non-repudiation is the digital signature. The purpose behind a digital
signature is to provide a method for a signer to bind its identity to a piece of information. In
easy way, the digital signature of a message is a number resulted from a function of some
secret information belongs to the signer, and on the content of the message [5].
488
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Taking in consideration that n should be long enough (for example; n=1024 bit length)
and the difference between the primes n1 and n2 (which are half length of n, i.e.: each one
of them is 512 bits of length) should not be small. If n1 and n2 is small, then n could be
factorized and the secret key could be determined [5].
At the second phase, the source node calculates the signature for each m M as follows:
1. Compute the signature s=md mod n, 0 m <n.
489
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
5. SYSTEM MODEL
There are X1,X2,,Xm information source observed at source node S. The intermediate
nodes are capable of encoding the incoming messages Xi ,i=1,..,m into encoded message.
Hence, the encoded messages could be written as:
E (1 , 2 ,...., m ) ( X 1 , X 2 ,...X m )T mod (1)
Where i is a coefficient picket up randomly from a finite field (Galois Field). Every
intermediate node performs network coding operation on its incoming packets and generates
the vector E, then computes the signature for E. If S denotes the signature function, then the
signature will be calculated by using the, multiplicative property which is sometimes referred
to as homomorphic property [5], [6], [7] as:
d
r
S ( E ) ( X i i ) mod mod n (2)
i 1
Where r represents the number of incoming links (packets to be network coded) at any
node , then append S(E) to E and forward it downstream, the packet format will be [E + S(E)],
where the first part represents the encoded message and the second represents its signature.
The intermediate/sink node verifies the received message (packet) according to the source
(signer) public key and the message signatures. Simply, the verifier check whether
S ( E ) e mod n E (3)
If the above equation satisfied, then the packet will be considered as valid one, otherwise
its polluted and will be discarded. Since each intermediate node or sink node will receive r
packets from its r incoming links, so we need to compute (3) for r times in order to verify all
the incoming packets which will take long time.
To increase the calculation speed of verification process; we support the batch verification
[8]; which will speed up message verification. The verification process in 3 will change to
be:
e
r r
Si mod n mi mod n (4)
i 1 i 1
To see the proof of the above formula the reader may refer to [7].
490
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
6. SECURITY ANALYSIS
The message is defined as polluted by the inequality (5):
S(E)e mod n E (5)
which means that the content of the message is incompatible with the signature attached with.
To prevent unauthorized persons/nodes from polluting the encoding message; each signature
should be calculated based on the secret key and the verified message.
In this system, determining the sources private key from its public key is equivalent to solve
the problem of integer factorization, which is a hard problem to solve and its hardness
depends on the length of n.
7. CONCLUSION
In this work, RSA digital signature scheme is adopted to solve the problem of pollution
in single-source network coding. Each intermediate node will receive many signed packets;
this will slow down the verification process. To overcome this slowness; the batch
verification is used to speed up the verification process. The only disadvantage in our system
is that we need to transfer the secret key to all the intermediate nodes via secure channels.
8. REFERENCES
[1] R. Ahlswede, N. Cai, S. Li, R. Yeung, Network information flow, IEEE Transaction
on Information Theory, vol. 46, no. 4, pp 1204-1216, 2000.
[2] Y. Wu, On constructive multi-source network coding, in IEEE International
Symposium in Information Theory, Seattle, July 9-14, 2006.
[3] S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, Resilient network coding
in the presence of byzantine adversaries, IEEE Proceeding INFOCOM, 2007.
[4] Gkantsidis, P. R. Rodriguez, Cooperative security for network coding file distribution,
IEEE Proceedings INFOCOM, 2006.
[5] A. Menezes, P. V. Oorschot, S. Vnastone, Handbook of Applied Cryptography, 5th. ed.
Florida: CRC Press, 2011.
[6] J. Talbot, D. Welsh, Complexity and Cryptography, 1st. ed., Cambridge, Cambridge
University Press, 2006.
[7] L. Harn, Batch verification multiple RSA digital signature, IEEE Xplore, vol. 10, Issue
12, pp. 1219-1220, 11 June, 1998.
[8] M. Bellare, J.A. Garay, T. Rabin, Fast batch verification for modular exponentiation
and digital signature, Proceedings of Advances in Cryptography, LNCS, vol. 1403,
1998
491
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Emad H. Al-Hemiary
Networks Engineering Department, College of Information Engineering, Al-Nahrain University
Baghdad - Iraq
emad@coie-nahrain.edu.iq
1. INTRODUCTION
D
atacenter is a combined electrical, mechanical, and civil infrastructures
within an organization, city, country or worldwide level. Whether it is
centralized or distributed, many requirements are listed by specialists for
efficient and powerful datacenters [1,2]. These requirements include specialized rooms
containing networking devices and servers secured by special equipment and maintained
operational most of the time using backup electrical systems supporting power failure
situations. The main function of datacenters is the store and process of data as well as
network services. Every organization; small, intermediate, or enterprise have their own
datacenter where it keeps and centralize its information technology (IT)
communications within one or more physical geographical area. Storing data coming
from within the organization or remotely from other connected sites is associated with
492
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
security measures. Therefore, IT specialists link data storage servers with security
access [3].
When datacenter network requires more servers to be added in order to increase
capacity or add new type of service, physical hardware servers increase and large
number of servers becomes an issue which need more management, control and
operational power. This where virtualization [4] takes place. Virtualization is the
process of exploiting servers power through creating smaller virtual servers, services,
or functions. Imagine a hundred service and each counted service requires a standalone
server with ( , , ) where the latter symbols represents (processing speed, dynamic
memory, permanent storage). If one physical server have (, , ), then approximately,
a new virtual machine (VM) could be created as long as:
> |, (1)
and is the required memory for the operating system running virtualization and the
symbol | represents conditional relation on and . As long as the and (central
processing unit supports virtualization and the permanent storage is dynamically
allocated and adequate) are satisfied, the virtual machine is related to the available
memory. According to that, the number of VMs can be counted approximately as:
(3)
Thus, the major requirement for creating virtual machines within physical sever is the
capacity of its dynamic RAM (random access memory). For the previous calculations,
the one hundred servers example could be distributed over five, ten or twenty physical
servers depending on the servers power and capacity. Whenever the cost and space is
a problem, virtualization is the solution. Many management software called Hypervisors
[5] allow many guest operating systems to run on the same physical server machine.
Kernel Virtual Machine (KVM) [6], VirtualBox [7], Xen [8], and VMWare [9] are
examples of widely used hypervisors. Since the focus of this work is based on open-
source, Linux-based software are used exclusively. The rest of the paper is organized as
follows: Section 2 discusses network services and their practical implementation
requirements and section 3 gives the implemented virtualized network layout.
Conclusions are given in section 4 and finally references are listed in section 5.
493
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2.1. DNS
The naming strategy followed since the Internet becomes globally wide helps end users
to use names instead of numbers in web browsing and servers connections. This is better
remembered since numbers; referred to IP (Internet Protocols) addresses, are difficult to
remember and might change according to organization network updates. Therefore the
naming strategy (DNS) is essential whenever web, email, multimedia or other types of
services are operational. Shortly, DNS functionality is to map names to IPs and vice versa.
But this is not the only functionality it possesses! DNS is actually the key to other services
especially when ownership and authentication is required for the domain it serves. To
highlight this function, figure 1 shows a typical DNS network services or protocols hosted
by an organization denoted by local site. As the figure shows, an authoritative-only DNS
(responds only to queries about domains or subdomains configured inside by the network
administrator) with master-slave configuration to ensure continuous operation and this
should be physically separated and not in the same geographical area and also not logically
addressed by the same subnet to isolate any power or network failure and keep service
operational. The DNS server consists of two zones: forward and reverse. The forward zone
configures the domain name like anydomain.com and lists all the required records within a
file known to the DNS process called forward zone, while the reverse zone is required for
IP-Name verification, this is explained later on. As shown in figure 1, the master (primary)
DNS service updates its slave (secondary) with zone records periodically or when the zone
file serial number is changed, and in this way the slave becomes an updated copy from the
master.
Local Site
Web
Database
494
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
2. It is important to mention here that the local site may have its own DNSs for serving local
clients and these DNSs are not what figure 2 shows. As the reader recalls, the main IP
version 4 TCP/IP settings requires four IP numbers to work: IP address of the machine,
subnet mask, default gateway (first router the client connects to) and the primary DNS to
contact for web requests. The latter one is called non-authoritative and responds to any query
through its local cache. On the other hand, DNS holds authentication records for verification
purposes. As an example, the google site verification is a TXT record issued by Google for
a specific domain to verify its ownership and this is used typically for verifying domain mail
server as it will be shown later on. Table 1 shows authentication records and their
functionality.
A query from the requester
DNS reach Nameserver
(ns1) for anydomain.com 1 What is the IP address for
ns1.anydomain.com 2 www.anydomain.com?
ns1 IN A 1.2.3.4 6
ns2 IN A 5.6.7.8
www IN A 1.2.3.5
mail IN A 1.2.3.6
... 5
Forward zone
Web Server
www.anydomain.com
1.2.3.5
FIGURE 2. DNS response to queries. All messages are exchanged over UDP port 53.
2.2. MAIL
One of the main services required by an organization for exchanging messages is the
electronic mail. E-Mail service is composed of many protocols for sending and receiving
messages. The E-Mail server uses Simple Mail Transfer Protocol (SMTP) [11] either
unsecured (port 25) or secured (Secure Socket Layer - SSL port 465 or Transport Layer
Security TLS port 587) to send messages to another server. The receiving protocols are
mainly Post Office Protocol or simply POP3 (Unsecured port 110 or SSL port 995) and
Internet Message Access Protocol or simply IMAP (unsecured port 143 or SSL port 993).
Due to the fact that email is a source of Spams and Viruses, ownership and authentication of
the sending mail server is required by the receiving mail server. The process involves a trace
back from the recipient Mail Server to the sender as shown in figure 3. When an email is
send from some mail server to another one, the recipient mail server contacts the ISP (Internet
Service Provider) of the senders mail server asking for reverse lookup of its IP address to
its name. If a match is found then the email is accepted, otherwise the recipient mail server
495
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
establish a reject policy regarding the senders mail server and its IP address. The case
becomes worse when the recipient mail server is Yahoo, Gmail, Hotmail or other free web-
based global mail servers. This is due to the SPAMHAUS Project [12] where IP addresses
are stored as black listed. Therefore, for practical perspectives, any mail server should contact
SPAMHAUS database to ensure and verify senders.
As figure 3 reveals, the role of DNS is clearly mandatory in the process of sending and
receiving email. Without the authentication mechanisms shown in table 1 and figure 3, the
email sender cannot sustain his eligibility and thus considered as Spam.
496
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
emad@anydomain.com hasan@yahoo.com
To: hasan@yahoo.com 1
From: emad@anydomain.com SMTP TLS
Message: ... connect to
mail.yahoo.com
Accepts Connection
2 2
Receives Message
Mail server 3
Hold message
mail.anydomain.com INTERNET Read sender s IP address
1.2.3.6
4 Is 1.2.3.6 listed?
Answer: No -> Perform 5
5
ISP s DNS Answer: Yes -> Return rejection
Is 1.2.3.6 point to mail.anydomain.com? response to sender with 550-5.7.1 code
Yes: Receive email and consider sender Authentic
No: Reject email and notify sender
...
1.2.3.6 IN PTR mail.anydomain.com
... SPAMHAUS Project
Reverse Zone Database
497
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
In the network shown in figure 4, the master DNS located in the college of Information
Engineering / Al-Nahrain University is synchronized with its slave DNS installed in the
department of Research and development at the Ministry of Higher Education and Scientific
Research. Both of these servers run NSD (Name Server Daemon) software and encrypt their
synchronous updates with private key. Whenever a request reaches the Master DNS
(identified by its parent DNS), the master DNS responds back with query answer unless it is
unreachable and consequently the slave DNS responds back on behalf. Figure 4 shows also
the reverse DNS location in the network of SatGate ISP for proper email server ownership.
The whole network is operational without problems and it is completely built using open-
source software as indicated in Table 2. Maintaining virtualized services running requires
periodic monitoring and backup and these are also managed using available open-source
software like Nagios [13] and Amanda [14].
4. CONCLUSIONS
In this paper, practical perspectives in network service virtualization are highlighted.
Different types of services like DNS, Web, and Mail are explained and critical issues running
them are pointed out. The work is implemented using open-source software features no cost
(low cost when support is needed), reliability and high availability. It has been shown that
physical servers can be divided into multiple VMs using hypervisors software like
VirtualBox to exploits its resources, and each VM is considered as a dedicated server with
assigned amount of memory that is considered the key to virtualization. Therefore, the
amount of memory decides how many running VMs a hypervisors can produce as it has been
shown by the approximate equations in section 1. The work shows practical implementation
of multiple site-to-site cooperation to achieve the required ownership, authentication and
verification for domain and mail services. Finally, the use of virtualization easily expands
network services as the process involves adding virtually and not physically.
498
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
Slave
Authoritative-
Only DNS
Security
Slave DNS
Measures
SatGate Iraq
Security ISP
Master Measures
Authoritative-
Only DNS
...
Local Network
5. REFERENCES
[1] M. Rahman, and A. Esmailpour, A Hybrid Network Architecture for Data Centers, in
IEEE First International Conference on Big Data Computing Service and Applications
(BigDataService), 2015, pp. 7-13.
[2] G. Schulz, The Green and Virtual Data Center, Boston MA, USA:Auerbach Publications,
2009.
[3] M. Ammar, M. Rizk, A. Abdel-Hamid, and A. Aboul-Seoud, A Framework for Security
Enhancement in SDN-Based Datacenters, in 8th IFIP International Conference on New
Technologies, Mobility and Security (NTMS), 2016, pp. 1-4.
[4] N. Jain, and S. Choudhary, Overview of virtualization in cloud computing, in
Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-4.
[5] A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, "kvm: The linux virtual
machine monitor", Proc. Linux Symp., vol. 1, 2007, pp. 225-230,
[6] Kernel-Based Virtual Machine (KVM), https://www.linux-kvm.org, (Accessed: 17th
March 2017).
[7] Oracle VM VirtualBox, https://www.virtualbox.org, (Accessed: 17th March 2017).
[8] The Xen Project (Xen), https://www.xenproject.org, (Accessed: 17th March 2017).
499
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
500
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
E. Banking
.
Haval.aqrawi@epu.edu.krd
.
luqmanruadzy@epu.edu.krd
1661
:
1662 :
:
:
:
, ,
,
,
.
( )Font
( )
.
501
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( )Software
( )Interface
.
.
.4 :
.
. .
. .
502
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.4.4 :
""Electronic Banking
" "Internet Banking "Remote Electronic
"Banking ""Home Banking ""Online Banking
""Self Service Banking " "Web Banking
"
".
) (pc
PME Personal Financial Management (Microsoft's
)Money ). ( Ntuits Quiken
:
,
.
.
.4.6 :
.
1685 American Express
Bank Americard 1675 Visa
Carte Bleue .
1657 France Telecom
Cartes mmoire 1662
Cartes puce .
.
()Foundation Sidssadol and Aokachir
.
503
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
504
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.6 :
.
:
INFORMATIONAL .6.4
.
.
COMMUNICATIVE .6.6
( )Email (.)Phone
TRANSACTIONAL .6.1
.
.
.
.1 :
.1.4
. "" " "
505
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
.1.6
.
.1.1 :
( )
.
.1.1 :
.
.1.3 :
.
.1 :
.1.4
,
.
.
506
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.1.4.4
.
.1.4.6
-:
.
.
.
.
.1.4.1
268
1
.
.1.4.1
.
.1.4.3
507
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( )Sony 15
.
.
.1.6
.
,
:
.1.6.4
.
,
,
.
.1.6.6
508
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
.1.6.1
.
.1.6.1
- -
.
.3 :
( ) ICT
.
.
.
509
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.3.4 ( )I.T.
:
.3.4.6
:
.
.3.4.1
.
:
.1 ()PHP-MY SQL SERVER
.2 ()ASP.NET
.2 :
:
.2.4
.
.
.2.6
,
:
510
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.2.6.4
( )Servers
.
.2.6.6
( )Load ( Account
.)Users
.7 :
.7.4
.1
.
.2 .
.3
.
.1
.
-8
.
.7.6
. .1
.2
.
. .3
. .1
. .8
. .7
.6
.
.5
.
511
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-17 ,
.
-17
.
-11 .
-12
.
" " -1
( )17 . 2717
. .2711 , -2
.
" " -3
5-6 . 2717
.2777 -1
-8
.2777
-7
.2777
-6 " "
.2002
-5
.2002
-6 " " .2777
-17 " (
) " .2775
512
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
1- Neil B.Harrison and Paris Avgeriou, Pattern-Based Architecture Reviews, IEEE,
2010.
2- Hui Li, Jingiun Zhang and Yuejuan Chen AspectOriented Modeling in Software
Architecture Pattern Based on UML, IEEE, 2010
3- Julie Street Fant,Building Domain Specific Software Architecture from Software
Architectural Design Patterns, ACM, 2011
4- B.Fernandez and Rouyi Pan, A Pattern Language for Security Models, Eduardo,
Plop Conference, 2001
5- Peter S. Rose, "UBank Management & Financial ServicesU" , Mc graw Hill,
International Edition, Sixth Edition,2005.
6- Fraser +Gup and kolari, "UCommercial Banking"U the UManagement of RiskU ,
South- Western Publishing (U.S.A), 2001
7-
1- www.centralbank.ae
2- www.ityarabic.org/e-businers.
3- www.bank.org/arabic/period
4- www.Bank.Of.cd.com
Abstract
Since the uprising spring in 1991 and the formation of the first government in the
Kurdistan Region in 1992 heighten attention a lot of information technology and its divisions
opened all the existing universities, including public and private universities, this opened the
large prospects in use in all areas, and a whole generation of sons appeared region have
become experts in the software to work on ready-made applications relying on computers
that are designed by private companies, whether they are in Kurdistan or abroad and solving
the problem of the quality of the writing (Font) in and databases which use in Kurdish
language Sorani dialect, Where previously the problem of Kurdish letters a major obstacle
in the use of computers in departments (Official office ) and private companies, and during
this period has been a set of software applications designed on PCs for a number of
government departments in interfaces multi-lingual, and there are applications only use the
Kurdish language.
With such a large number of specialist software engineering, banks and have access
to advanced degrees and their participation in the sessions and conferences outside the
province, but the government did not benefit them in the construction of application software
particularly in this area so that it is able to absorb the most important financial business in
513
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
the region and three interfaces multi-lingual, to see the problems this meet and we do not
benefit in a scientific discreet in this area, which will facilitate access to perfection and a goal
that please him.
In the developed countries and the Gulf in particular countries and the growing e-
commerce operations has become a great need for a new type of non-conventional banks in
terms using technology beyond the normal pattern of performance does not adhere to a place
or a specific time important, and as a result of the accelerating growth of information and
communication technology electronic banking, which contributed In came effective in
providing a variety of services, low-costs time and place.
514
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( )
The Effect of Using Tow Approaches of Distance Education
( Computer & the Internet) on Students' Achievement at Open
Education College and Their Motivation for Learning Mathematics
Dr.ahmed_Auun67@lfu.edu.krd
:
:
( ) . :
:
( ) ( )08
( )18 :
( ) 43 ,
.. ,
. ,:,
.
.
.
.
.
( )11-6 2772
( )
(
6886.)6
.
515
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) calculus
.
( )1
2773-2772 .
()4
6883-6881 6881-6881 6886-6884 6884-6888
%33.7 %33.23 %34.11 %31.70
.
( ) %27
) )*(.
.
( 6881 .)4
) (Distance Education .
.
.
) ( Hessemer , 1986 (
)2771 ) ( Gaeddert , 2001( ) 2773 ( ) 2773 (
) 2771 ( ) 2777 (
)2772 ) ( Shiratuddin , 2001) ( Heo & Chow , 2005
) (Douglas 1999 ( ) 2773 ( ) 2778
.
) (Wegner &Others , 1999 ( Favretto & Others ,
) 2005
( . ) 2771
. (*)
516
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) .
.
-:
(( " "
))
.
(. 6886
)6
( 2773 .) 1
( . 6883
)01
- -1 ((
))
( 17 - 18 2771 )
- 2 (
( 27 - 16 2778 )
- 3 26 26 2777
.
( 6881 )66-41
517
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
).(kosakowski ,1998 , EDO-IR-98-04 ( )2771
( ) ( 6884 .) 133
. ( Binder , 1993,p.39) .
( . , 6881 ,.) 43-41
) ( World Wide Web
.
) ( internet explorer ) ( e mail ( 0n- line
(Corl , 1996 ,ED402998 ) .
(cotton,1996,ED400577.
.
( 4111 .) 04
( . 2771.) 17
( . 6883 .) 11 - 16
( .
6881.)41 ) (Kuhn,2001
.
) . (Kuhn,2001,p.1 ) ( Charp,2000
518
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) 67
) . (Charp ,2001,p.10-14
. ( )2773
( 6881 .)7-2
( )2771
( . 6884 ) 41-44
.
( 4117 . ) 47-43
( . 4101 . )1
( 6884 .)2
( 4101. )6
. ( )1668 "
"
( .
4113 40 . )68
.
( 6888.)42-43
( 6888 . ) 473
" "
519
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
(
4112. )46
.)Lawson & Chinnappn, 2000, P 26( .
.
( 4113.)613-611
.
( )1656
-1 .
-2
-3 .
-1 ( . 4101 ) 164-168
( 4102 . ) 660-667
(Johnson , 2000 ,ED .
.)441302
( 4111 .) 616
(
6888 .)41 ( ) 2778
(6883 .)131 ( ) 2777
520
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
(. 6888)673-671
( )1656
( 4101 . )462( )1661
) 4111 . ) 1
(Middleton .
) &Spenias ,1999,p.67
)(Miltiadoa&Wilhelminac,2003,p.5
-:
-1
( )
.
-2
.
-3
.
-1
.
-8
.
-7
.
-6
.
:
( )
.
:
-1
()7.78
521
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-2
.
()7.78
:
-:
-1 ( )
-2 /
-3
:
-1 ): ) Distance Education
): (Simonson & other ,2000
"
".
. (Simonson & other , 2000 , p.7). ) ( (USDLA , 2004
) : "
" (USDLA , 2004 ,on-line) .
"
( )
" .
-6 ( ) Computer
( : )2777 "
" ( . 6888 ) 7
( : ) 2771 "
) (Data ) ( Instruction
) (Information " ( . 6881 )61
"-: (Pentium 4
) ) (Mouse ) (Keyboard
) ( Display Monitor ) (CD-D
) (Speakers ) ( Soft Ware ( Windows
) xp pro. SP2 "
-1 )( Internet
) ": (Costro ,1996
".
) (Costro ,1996,p.2 ( ": )2777
( 6888 "
) 680 ( ": ) 2771
" ( .
6884 ) 1 -:
522
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) 2777-2778
"
-1 )(Achievement (: )Chapln,1971
" (Chaplin , 1971 , .
) p.5 ) : ( Good ,1973 " " .
) ( Good ,1973 ,p.7 ( )1655 -: "
" ( . 4100 ) 44 "-:
"
- 3 ) ( Motivation of Learning
( ) 1666 ":
" ( . 4111 ) 42
) ": McMinn &Bulter,2003
"( McMinn &Bulter,2003 ,p.1). -:
"
" .
.
) : ( Distance Education
-: :
.
( . 4110 ) 6
( ) 1667 -:
-: ( 1587 ) .
-: ( ).
-: ( 1676 - 1677 ).
-: .
-: ( . 4112 ) 4
523
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
.
( ) 2777 :
-1 .
-2 .
-3
.
-1 .
-8
( . 6882)4
-:
( )2773
-:
-1
1517
-2 (1587)
( ).
-3 ) (Latter Day saints ( 1621)
.
-1 1618 ) ( Iowa
) (Etv .1687
-8 ( 1658) ( 1667)
) (NSF ( . 6881) 1
) (Valentine,2002 ( ) 177
524
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
(Valentine , 2002 , p.1) .
-: :
( ) 2771( ) 2777 :
-1 .
-2
-3
.
-1 .
-8 .
-7 .
-6 .
-5 .
-6 .
( 6881 ( (0-7 6882) 1-0
-:
( )2771 -:
-1
-2 .
-3
.
-1 .
-8 .
-7 .
-6 .
-5 ( . 6881) 434-438
( )2771 -:
- 1 .
- 2 .
- 3 .
- 1 .
- 8 ( . 6881 ) 6
525
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
: -:
( .
6882 ) 0 -:
-1
( Shale &Gomes , 1997 , p. 5 ( .
-2
( Garrison ,1997.p.8).
-3
(Feenberg,1999,p.337) .
4
( Johnson &others , 2000 , p. 5 ) .
-5
( ) 21 .
) ) Levin &others , 2001 , p.2
-6
(Twigg , 2003 , p.5 ) .
- 7
(Brown&others,2003,p.3) .
-8 .
)( Shachar&Neumann ,2003 , p.2
-: :
) ( James Taylor , 1995
(-: )1
( )1
-4
The corresesponde model
526
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
/ -: -6
-4
-6
-1
-1
-3
/ -: -1
/
the flexible learning model -1
/ -3
the intelligent flexible learning
, 6883 ) 00 - 03 (
:
-: ) ( Web/Computer-Based Training
:
) . ( Interactivity
( 6882 ) 41
) (Knowledge Transferring
:
.com www.bitlearning -1
www.mindleaders.com -2
)(Rovai , 2002 ,p.1 www.ajde.com -3
-:
) (Web/Electronic Performance Support Systems
.
527
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( 6881 .) 2 -3
()
Spice land &others ,2002 , p.1) ( .
on
line
( McDonald , 1998 , p. 244 ).
) ( The computer
-: :
528
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
) ( Preston ,1990
. ( Preston , 1990 ,ED 320 569 ) .
( 1663 ) 227
( . 4117 ) 71
.
.
.
. . (Anderson , 1998 ED421481 ),
( . 2777 .) 325
) ( Feed back ( . 2777 ) 211
) (Zeszotarski ,2000 ,ED438010 .
( 6886 )42 .
( ) 2771
- :
-1 .
-2 .
-3 .
-1 .
-3 ( . 6881 ) 7
529
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) 2778
( .
2777 . ) 21
..
-: :
( )2777
-:
-1 .
-2 .
-3 .
-1 .
-8 .
-7 ) .( Multimedia
( 6882 ) 421-421
-: :
) ( Sherwood ,1983 ( ) 1667
-:
-1 ) :( Managing Learning With Computer
()Data Bases )(Library Retrieval Systems
-2 ) : (Learning About Computer
). ( Computer Literacy
-3 ) :( Learning About Thinking With Computer
) (Processes
.
-1 ) : ( Learning From Computer
.
-8 ) : ( Learning With Computer
)(Simulation
) (Educational Game .
530
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-: :
-4 ) : ( Drill & Practice
) (Godfriey &Sterling , 1982 , p.144 .
-:
-1 .
-2 .
-3 .
-1 .
).).Goktep & Others , 1989 , p.167
( .
4111 ) 78
) : ( Educational Game
.
531
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-3 ) : ( Problem Solving
.
) , .(Alessi & Trollip 1985 ,p.52
( .
4102 ) 616-614
-2 ) : (simulation
(Alessi & Trollip , 1985 ,p.199).
( . 4111 ) 1
-: ( ) :
.
) (Hannafin & Hooper ,1989
-:
532
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-1 -:
.
-2 :
.
-3 -: .
) (Hannafin & Hooper , 1989 , p.155-156
( ) 2773 -:
-1
.
-2 .
-3 .
-1 .
-8
.
-7 .
-6 .
-5 ( . 6881 ) 48
) : ( The Internet
-:
.
) . (Tony ,1998 , p.1-3
(Haury & Milbourne , 1999 , ED 433218 ) .
) ( Williams ,1995
-:
-1 .
-2
.
533
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-3 .
-1
( . 6888 .) 1
.
( 6884 . ) 16-14
)(Spector & Michael , 2001, ED456841
)(Maylene , 2003,p.1
..
( ) 1665
"
"( . 6883 ) 11
.
- : :
( )2777 ( )2771
-1 .
-2 .
-3 .
-1 .
-8 .
534
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-7 .
-6 ) ( Intranet ) ( Internet
.
-5 .
-6 .
-17 ). (CD
-11 .
-12
.
-13 .
11 ) ( Classrooms Without Walls
.
( 6888 ( ) 1-4 6881 ( 1-6
-: :
( .
) 1666 -:
-1 .
-2 .
-3 ( . 4111 ) 3-1
( ) 2777 -:
-1 -:
.
-2 -:
.
-3
.
-1 -:
.
-8 .
-7 ( ( Lycos , yahoo , Google
.
-6
( . 6888 ) 42-41
( ) 2771
-:
-1 .
-2 .
535
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
%57 . -3
( ). -1
-8
.
( . 6881 ) 41-40 -7
: ) ( Motivation of Learning
) ( Christophel ,1990
.
) (Christophel , 1990 , p.323-340
) ( Borophy ,1987
( 6888 .) 1
( .
6883 ) 121
:
) (Weiner, 1980
-1 .
-2
.
-3 (Weiner, 1980 , p.19).
( )1652
-1
.
-2
. ( . 4106 )603
( )1651
-1 .
-2 .
-3 .
-1 ( . 4101 ) 410
536
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( . 6888 ) 612-613
:
.
( Kloosterman & Gorman 1990, .
) .p. 375
.
) . ( Middlton & Spanias , 1999, p. 69
.
:
-1 :
( . 4101 ) 114
(
4116 . ) 461
( )
()2
( )6
-6 :
( 6884 .) 401
(
) ( ) 57 .
537
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( )43
( )43
( .
4112 .) 41
( )37
( )18 . ( )18
.
()3
( )3
-3 -:
( . 1658 ) 211
.
-:
/ :
()1
()1
2 (*)
2
44 1 43
1.01 8.411
41 6 43
538
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
()3
F F
044.6 044.6 4
1.6 8.16
4112.12 148747.14 60
/ :
( ) 11.5 ( 12.13
) ( ) 25 1 ( ) 7.78
( . ) 7
( ) 2
F F
8.00 8.00 4
1.6 8.84
24.30 4761.411 60
/ :
( ) 6
( ) 7
539
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
2 2
1 3 2
3.114 4.61
1 0 1
2 ( ) 2 ( ) 7.78
.
/ :
. 2 ( ) 1 (
) 7.78
( . ) 5
( ) 0
2 (*)
2
2 1
1.014 8.61
0 7
/ :
) ( Raven ) (Progressive Matrices
. ( )1653
( . 4101 .)11 -67
( )11.8
( )18.2 ( ) 25 1
( ) 7.78
(.)6
( ) 1
F F
1.0 1.0 4
1.6 8.82
73.74 6468 60
540
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
/ :
( ) 115.8
( 118.77
) ( ) 25 1 () 7.78
(.)17
( ) 48
F F
00.72 00.72 4
1.6 8.11
623.2 7112.201 60
- 5 :
/ :
-:
-1 ) .) Function
-2 ( .) Limit
-3 (. ) Continuity
-1 ( .) Differentiation
-8 ( .) Application of Differentiation
/ :
.
( )27
(
) .
.
/
" "
( 4110 ) 40
( ) 8
541
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-:
-1 ) .) Function
-2 ( ) Limit .
-3 ( ) Continuity .
-1 ( ) Differentiation.
-8 Differentiation) Application of
( )
( 4101 . )12
(
)
( )
( )177
%57
.
( ) ()11
()44
11 48 41 43
43 7 6 2
7 6 1 6
61 2 0 1
42 0 1 3
488 11 18 17
/ :
-:
-1 .
-2
. ()1
542
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
(
)
( )
()4
.
( )12
.
( ) 46 ( )
7
27 ( )
71 ( )
12 ( )
16 ( )
38 ( )
163
( ) ()13
543
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( )41 ( )
07 ( )
28 ( )
18 ( )
448 ( )
18 ( )
117
( :) 2
()2
544
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
)(n ()6 ()4
()1
545
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
( ) ( )772 ( )328
( ) ( )336
.
2 :
/ :
( )
- :
.
- :
( )
( ) 87
.
:
( )41
488 () 11 () 18 () 17
42 3 3 2 %11 0
9 1 3 1 %47 1
3 4 4 1 %0 6
41 1 1 3 %63 2
1 1 1 1 %47 1
38 42 16 18 %488 61
- :
( )87
(
) ( )87
546
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-: ( )38 1 .
( 1667 .)68
. ( ) 11 - 37 , ( - 12
) 87 .
- :
.
:
( ) 87
- :
( ) 3
%56
- :
( )
( )87 (
)%26 ( ) ( )%26
( ) . ( )11
( )11
:
1 -:
( 0.357 ) 0.714
547
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
2 -:
( 7.386 ) 7.68
.
1 : (
)
1 :
( )67
.
3 :
.
-:
( ) %56
.
2 :
- :
) (Split Half Method .
( )
.
( ) 7.65
( ) . .
( ) 7.55
- :
( )Cronbach - Alpha
( . 4110 )133
( )7.61
.
/ :
( )
( )1666
548
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
:
- : ( )37 ( )21 ( )18
( :
) (37
)111
- :
%67
- : ( ) ( )87
( )%55
( 4101 )468 .
- 6 :
-1
-2 :
.
-3 :
( )
)
.
-1 :
.
549
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
- 8 :
.
) :
/
. -:
( ." )7.78 :
( )43
t
t
(*)
16.316 16 43
( )
4.784 4.016
14.67 17.11 43
()
( )12
( )36.63
( )1.532 ) ) t
( )1.671
.
. -:
"
(" . )7.78 :
()42
t
(*)
t
8.717 411.21 446.1 43
4.784 ( )
550
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
610.41 480.1 43
()
()446.1
( )480.1
( )8.717 ( ) t ()4.784
.
/ :
- :
-:
-1
( )
( )727
) ( E- books
( )Pentium - 1
) (Feed Back .
(
)Microsoft Office PowerPoint 2003
.
( )17
.
551
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
.
.
-2
.
) ( Calculus
) ( ON LINE
.
( )
.
( )
-:
-1
.
-2
.
-3
-1
.
552
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-8
.
-7
.
-6
.
-5
.
-6
.
-17
TI-85 Graphing
Calculator Live Math Notebook
.
( )
() 1
-:
-1
( )17
.
-2
.
553
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-3 (
)
.
-1
.
-7 ( )
( 2771 ( ) 57 1666 ( )61
1666 ( )81 2778 )Keller, 1983, P. 603( )373
.
:
-1
.
-2
.
-3 ) ( Tutorial
.
.
-1
-1
2773
" " -2
( )44-1
. 2772
-3
( ) ( )66-68
. 2773
-1
( .2771 )
-8
.2777
554
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-7 .1666
-6 1 .2777
-5 1 3 . 2777
-6
( )2 . 2771
-17 .1658
-11
( .2771 )
-12 .1661
-13
1 2 . 1666
-11 .1656
-18
( . 1656 )
" -17
: " ( ) 7 0
. 2771
-16
. 1668
-15 " " ( )44-1
2771
-16
.1653
-27 " "
7 2 . 2771
-21
.2771
-22
( )44-1 . 2772
-23
( .1656 )
-21 .2771
-28 ( )4 . 1668
-27
. 2773
-26 " "
88 . 1668
-25 . 1667
-26
( .2778
)
-37 " "
61-67 .2777
1 .1666 -31
-32 1 . 2771
-33 "
. 2773
555
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-31 ( ) WebCT
/
( . 2772 )
-38
2777
-37 "
" 6 1 .2777
-36 1653
-35
( )44-1 2771
-36 1 2777
-17
. 2771
-11 .1653
-12
.1658
-13 " " PC Magazine 1666
.
-11 "
" 61-67
.2777
-18 . 1668
-17 1 .1667
-16
( .1662 )
-15 1667
-16 "
( )
"
. 2773
-87 . 1656
-81
( .1666 )
-82 " " 13
( )3 , 1666
-83 1
.1666
-81 . 1651
-88 " ( : )"
44-1
. 2772
-87
.1653
-86
1656
-85 . 1667
-86 " "
17 . 2771
556
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
-77 7 1665
.
-71 . 2771
-72 3 2778
-73
( .1666 )
-71 " "
11.1666
-78 " " 26
61656
-77 " " ( ) 1/6 - 6/ 67
. 2773
-76 ( )
" 3 1
.2772
-75 1 .1655
-76 2777
.
-67 . 3
.1651
-61. 1 .1657
-62
. 2773
-63 :
21 . 1666
-61 " "
82 2.1663
-68 1 .1656
-67 1 .2777
-66 " " ( )
27 2 .1663
-65 " "
. 1665
-66 :
( ) 62 61 . 1665
-57 Microsoft Visual Basic 0.6 Professional
.1666
-51 " "
( )62-61
.1665
-52 .1652
-53
.2773
-51 " "
. 2778
-58 ( 6888 6888 ) 1
. 1666
557
The 1stInternational Conference on Information Technology
)(ICoIT'17
Lebanese French University - Erbil, Kurdistan Region Iraq
101- Aiken , Lewis R , Psychological Testing And Assessment , 3rd , Allyn & Vacon Inc
,U.S.A , 1979 .
& 102- Alessi, Stephen M. & Trollip, Stanley, Computer Based Instruction (Methods
Development), Univ. of Iowa, 1985.
103- Anderson, Jeffrey, " Service - Learning and Teacher Education ", ERIC Digest, ERIC
Identifier (ED 421481), U.S.A , 1998.
104- Binder, C., " Behavioral Fluency A new Parading ",(in) Educational Technology, Vol.33,
Englewood Cliffs , U.S.A, 1993.
105- Brown , Gary, & Others , " Formal Course Design and the student Learning Experience
" Journal of Asynchronous Learning Networks , 7(3) , 2003 .
106- Costro , Paulo M.S, Internet in Mechanical Engineering Education & Practice ,
University of California , U.S.A , 1996 .
107- Chaplin, J.P., Dictionary of Psychology, 4th ed, Dell, New York, 1971.
108- Charp ,S. , " Internet Usage Education " , Technology Horizon in Education , ( The ) ,
27(10) , U.S.A , 2000.
109- Christophel, D. M. , The relationship among teacher immediacy behaviors, student
motivation, and learning ".(in) Communication Education, 39, 1990 .
558
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
110- Cooper, Hohn, Measurement and Analysis of Behavioral Techniques, Chio Charles, E.
Merill, Columbus, 1974.
111- Corl, S.F., " Novices on the net : An introduction to education class uses e-mail and the
Internet ", ERIC Digest, ERIC Identifier (ED 402998), U.S.A ,1996.
112- Cotton, Eileen Giuffre, " The online Classroom : Teaching with the Internet ", ERIC
Clearing House on Reading English & Communication, ERIC Identifier (ED 400577),
U.S.A , 1996.
113- Crawford ,C ., The Art of Computer Game Design , , Mc Graw- Hill , Berkely , 1984 .
114- Douglas , Masakoo , Individualized Learning ,Utilizing the Internet and JWPce
Computer Program: A Case Study of Heritage Japanese language learners , University
of California , U.S.A , 1999.
115- Ebel, R.L., Essentials of educational measurements, 2nd ed, Englewood Cliffs,
Prentice - Hall, New Jersey, 1972
116- Ehrmann , Stephen C. , " Asking the Right Question : What Does Research Tell Us
Technology and Higher Learning? ",(in)Change,(27) 2, 1997.
117- Ellington ,H. and Adinall , E, A Handbook of Game Design , London, Kogan Page ,
1982 .
118- Favretto ,Giuseppe &others , "E-learning measurement of the learning differences
between traditional lessons and online lessons " , European Journal of Open, Distance
and E-Learning , no.(2) ,on-line ,2005.
119- Feenberg , A. , "Reflections on the Distance Learning Controversy" , Canadian Journal
of Communication , no.24 , 1999 .
120- Finney ,Ross L., Thomas , George B. , Calculus , Addison-Wesley Publishing Company
, Vol. ( 1) ,U.S.A, 1989 .
121- Flowers , Jim , " Online Learning Needs in Technology Education " , Journal of
Technology Education , 13(1) , Fall , 2001 .( on-line )
122- Freund, John.e, Modern Elementary Statistics, 5th ed, Prentice / Hall International
editions, Englewood Cliffs, New Jersey, U.S.A, 1979.
123- Gaeddert ,Terri J. , Using Accelerated Math. To Enhance student Achievement in high
School mathematics Courses , Friends University , U.S.A , 2001 .
124- Garrison ,D. R. , "Computer Conferencing : The Post Industrial age of Distance
Education " , (in) Open Learning ,12( 2 ) , 1997 .
125- Garrison, D. R., & Anderson, T., " Avoiding the industrialization of research universities:
Big and little distance education" , The American Journal of Distance Education, 13(2) ,
1999 .
126- Godfrey , D.& Sterling ,S.; The Elements of CAL , , Reston Publishing Co. Reston
,1982 .
127- Goktepe, Must & Others, " Design And Implementation of a Tool For Teaching and
Programming ", Computer And Education, Vol. 13, No. 2, 1989.
128- Good, G.V., Dictionary of Education, 3rd ed, McGraw - Hill, New York, 1973.
129- Hannafin, M. J & Hooper, " An integrated framework for CBI S.screen design and layout
". Computer in Human Behavior , 5(3) ,1989 .
130- Haury, David L. " Milbourne, Linda A. Using the Internet To Enrich Science Teaching
and Learning " , ERIC Digest , ERIC Identifier (ED433218),U.S.A , 1999 .
131- Heo ,Misook & Chow, Anthony , "The Impact of Computer Augmented Online
Learning and Assessment Tool " , Educational Technology & Society , 8(1) , 2005 . ( on-
line )
559
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
132- Hessemer, S.J., " The Effect of Computer Assisted Instruction on Motivation and
Achievement in Fourth - Grad Mathematics ", Dissertation Abstracts International, Vol.
47, No. 10, April, 1986.
134- Johnson, Scott D.,& others , " Comparative Analysis of Learner Satisfaction and Learning
Outcomes in Online and Face to Face Learning Environments. " , Journal of Interactive
Learning Research , 11(1) , 2000 .
135- Keisler , H. Jerome , Elementary Calculus An Infinitesimal Approach , Second Edition
,University of Wisconsin , U.S.A , 2005.
136- Keller, Bonnie & Reigeluth, Charls, A Comparison of Three Instruction
presentation Format, Syracuss Univ. School of Education, No. 6, New York, 1982.
137- Kloosterman P., & Gorman J., " Building Motivation in the elementary mathematics
classroom ", School Science and Mathematics, Vol. 90, U.S.A., 1990.
138- Kosakowski, John, " The Benefits of Information Technology", ERIC Digest, U.S.A ,
EDO - IR - 98 - 04, 1998.
139- Kuhn ,Tomas, " Internet Teaching :Introduction , (in) EESE ,Vol.5 ,Berlin , 2001.
140- Lawson, Michael J., & Chinnappan, M., " Knowledge Connectedness in Geometry
Problem Solving ", JRME Online, Volume 31, Issue 1, January, 2000.
141- Levin , Sandra R. &others " Highly Interactive and Effective Online Learning
Environments for Teacher Professional Development. International Journal of
Educational Technology " , 2(2) ,2001.
142- Maylene Y., Damoense , " Online learning: Implications for effective learning for higher
education in South Africa " , Australian Journal of Educational Technology , 19(1), 2003
. ( on-line )
143- McDonald.. " Interpersonal group dynamics and development in computer conferencing
:The rest of the story". In Proceedings of the Annul conference on Distance Teaching and
Learning, Madison, Wisconson. 1998 .
144- McMinn , N. &Butler S. , " Linking Assessment and Motivation in the Classroom
Environment " , (in) Learning Consortium Conference , Retrieved Feb. 9 , 2003 .
145- Middleton, J.A., & Spanias, P.A., " Motivation for Achievement in Mathematics: Finding,
Generalizations, and Criticisms of the Research ", JRME Online, Volume 30, Issue 1,
January, U.S.A., 1999.
146- Moore , M.G. , " Editorial : Distance Educational Theory " ,The American Journal of
Distance Education , 5(3) , U.S.A ,1990 .
147- Morgan, Nancy A. - Sprague, Carolyn , " An Introduction to Internet Resources for K-12
Educators. Part II: Question Answering, Electronic Discussion Groups, Newsgroups,
Update 2000 " , ERIC Digest , ERIC Identifier (ED 438808) ,U.S.A , 2000 .
148- Preston, Nancy R., " Trends and Issue in Educational Technology: 1989, ERIC Digest,
ERIC Identifier (ED 320569), U.S.A ,1990.
149- Roblyer, M.D., " The Impact of Microcomputer - Based Instruction on Teaching and
Learning: A review of Recent Research ", ERIC Digest, ERIC Identifier (ED 315063), U.S.A
,1989.
560
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
150- Rovai ,Alfred P. , " A Preliminary Look at the Structural Differences of Higher Education
Classroom Communities in Traditional and ALN Courses " , Journal of Asynchronous
Learning Networks , 6(1) , 2002 .
151- Shachar , Mickey & Neumann ,Yoram , " Differences Between Traditional and Distance
Education Academic Performances :A meta- Analytic Approach " , International Review of
Research in Open and Distance Learning , 4(2) , 2003 .
152- Shale , D. &Gomes , J. , " Performance Indicators and University Distance Education
Providers " , Journal of Distance Education ,13(1) ,1997.
153- Shiratuddin , Norshuhada , "Internet Instructional Method: Effects on Students
Performance" , Educational Technology & Society , 4(3) , 2001 . ( on-line )
154- Sherwood, Robert D., " Computers in the Schools: Methods of Utilization and Action
Recommendations ", Thesis at New York University, ERIC Digest, ERIC Identifier (Ed
24147), 1983.
561
The 1stInternational Conference on Information Technology
(ICoIT'17)
Lebanese French University - Erbil, Kurdistan Region Iraq
ABSTRACT
Distance education is one of the most common educational patterns in our world today,
especially in the field of university education, in order to provide higher education
opportunities to those who missed these opportunities due to economic and social conditions.
The aim of this research is to know the effect of using two methods of distance learning
(computer and internet) on achievement and motivation. The research community determines
the first grade students in the mathematics department at the Open Education Center (the
Open Study Center in Baghdad), which consists of (80) students divided into four study
groups. The researcher randomly selected 30 students randomly divided into two
experimental groups .a number of educational sites that teach calculus on the Internet has
been determined. Acomputer educational program has been prepared, designed and
implemented. An achievement test of subjective type was prepared and a measure of
motivation for mathematics has been used. The research results in the superiority of the first
experimental group that studied using the computer on the second experimental group that
studied using the Internet in achievement. There were no statistically significant differences
between the two research groups in the motivation measure of learning towards mathematics.
The research found that the use of the computer tutorial was better than the Internet in student
learning and had a positive impact on their achievement.
562