https://journals.cihanuniversity.edu.iq/index.php/cuesj/issue/feed Cihan University-Erbil Scientific Journal 2019-11-16T10:14:43+00:00 Cihan University-Erbil Journal ojs.admin@cihanuniversity.edu.iq Open Journal Systems <p>Cihan University-Erbil Scientific journal (CUESJ) is a biannual academic journal published by the Cihan University-Erbil. CUESJ a periodical journal publishes original researches in all areas of Science, Engineering and Technology. CUESJ is a Peer-Reviewed Open Access journal with Creative Commons Attribution Non-Commercial No Derivatives License 4.0 (CC BY-NC-ND 4.0). CUESJ provides immediate, worldwide, barrier-free access to the full text of research articles without requiring a subscription to the journal, and has no article processing charge (APC). CUESJ applies the highest standards to everything it does and adopts IEEE citation/referencing style. CUESJ Section Policy includes three types of publications; Articles, Review Articles, and Letters. CUESJ is a member of the ROAD with print-ISSN: 2519-6979 and a member of the Crossref a doi: 10.24086/issn.2519-6979</p> https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/102 Evaluation of the Effect of Follower Jammer on the Mobile Bluetooth Network 2019-11-16T10:14:43+00:00 Abdulqadir Ismail Abdullah abdulqadir.abdullah@knowledge.edu.krd Adil Hussein Al-Dalawie abdulqadir.abdullah@knowledge.edu.krd <p>Bluetooth wireless communication technology has spread rapidly in the past 20&nbsp;years. It has made life much easier with all the devices that use Bluetooth technology around us such as mobile phones, laptops, and watches. With all the good and useful applications of Bluetooth technology, it has been used in harmful and bad ways such as cheating in an examination. In this article, parameter design considerations have been discussed for a follower jammer to interrupt a Bluetooth network, especially when it is used in unauthorized way. The effects of the follower jammer were studied and tested. The effects were calculated for time and jamming-over-signal ratio for three different distances (1, 5, and 10&nbsp;m). The testing showed that the follower jammer designed was successful in disrupting the Bluetooth signal.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/104 A New Scheme for Removing Duplicate Files from Smart Mobile Devices 2019-11-16T10:14:41+00:00 Ammar Asaad en.uobasrah.edu.iq/ali.yassin@uobasrah.edu.iq Ali Adil Yassin Alamri en.uobasrah.edu.iq/ali.yassin@uobasrah.edu.iq <p>The continuous development of the information technology and mobile communication world and the potentials available in the smart devices make these devices widely used in daily life. The mobile applications with the internet are distinguished simple, essay to use in any time/anywhere, communication between relatives and friends in different places in the world. The social application networks make these devices received several of the duplicate files daily which lead to many drawbacks such inefficient use of storage, low performance of CPU, RAM, and increasing consumption battery. In this paper, we present a good scheme to remove from the duplicate files, and we focus on image files as a common case in social apps. Our work overcomes on the above-mentioned issues and focuses to use hash function and Huffman code to build unique code for each image. Our experiments improve the performance from 1046770, 1995808 ns to 950000, and 1981154 ns in Galaxy and HUAWEI, respectively. In the storage side, the proposed scheme saves storage space from 1.9 GB, 1.24 GB to 2 GB, and 1.54 GB, respectively.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/105 A Face Recognition System Based on Principal Component Analysis-Wavelet and Support Vector Machines 2019-11-16T10:14:40+00:00 Laith R. Fleah laith.flaih@cihanuniversity.edu.iq Shaimaa A. Al-Aubi laith.flaih@cihanuniversity.edu.iq <p>Face recognition can represent a key requirement in various types of applications such as human-computer interface, monitoring systems, as well as personal identification. In this paper, design and implement of face recognition system are introduced. In this system, a combination of principal component analysis (PCA) and wavelet feature extraction algorithms with support vector machine (SVM) and K-nearest neighborhood classifier is used. PCA and wavelet transform methods are used to extract features from face image using and identify the image of the face using SVMs classifier as well as the neural network are used as a classifier to compare its results with the proposed system. For a more comprehensive comparison, two face image databases (Yale and ORL) are used to test the performance of the system. Finally, the experimental results show the efficiency and reliability of face recognition system, and the results demonstrate accuracy on two databases indicated that the results enhancement 5% using the SVM classifier with polynomial Kernel function compared to use feedforward neural network classifier.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/106 Design and Implementation a Novel Research Management System 2019-11-16T10:14:39+00:00 Omar Talal Hamid omar_talal20022003@yahoo.com <p>Publications and researches are one of the important activities of higher education institutions (HEIs) worldwide. Many HEIs, especially in Iraq, are facing different types of problems in managing publication information. This paper presents the design and implementation of researches management system (RMS) to be adopted in one of the state universities in Iraq. RMS is a web-based application to manage the publications and researches information in HEIs. The main goals of this application are collecting all submission publication information in a central database, generating different types of publication reports, generating real-time different statistics, saving all researchers information in the HEI, and facilitating checking and tracking the submitted researches.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/107 Automatic Identification of Communication Signals Using Zero-Crossing Based Techniques 2019-11-16T10:14:38+00:00 Emanuel S. H. Qas Marrogy emanuel.hanna@muc.edu.iq <p>The identification of different types of modulation for any intercepted communication signal out of the vast hierarchy of possible modulation types is a key fundamental before advising a suitable type of demodulator, where this process is usually a manual option. This technique is extremely important for the purposes of communication intelligence. In this paper, a proposed methodology is suggested, validated, and tested (through computer simulations) for the automatic identification of the modulation type (analog and digital) of the intercepted communication signals. The methodology is based on the zero-based representation of signals and utilization of new algorithms for such identification.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/109 Solving Isolated Nodes Problem in ZigBee Pro for Wireless Sensor Networks 2019-11-16T10:14:38+00:00 Nabaa Abdul-Khudhur Hasan nabaa_alkhafagi@yahoo.com F. Alaa Kadhim nabaa_alkhafagi@yahoo.com <p>Wireless sensor network based on the ZigBee protocol consists of many sensor devices. In some cases, the sensor nodes may turn to isolated node because random distribution, particularly when creating the network. In this research was suggested two cases to overcome on the isolated node problem, the first case had able to overcome this problem by distributing the isolated nodes on the router nodes that carry the least number of sensor nodes, it helps to minimize the computational overhead on router nodes too, while the second one is able to overcome this problem by calculating the distance between the isolated nodes and the routers and then adds these nodes to the nearest routers. Subsequently, this method helps to minimize the energy consumption. The results show our approach able to solve the problem of isolated nodes using these two methods and when compared between them turns out the second method is better In terms of energy consumption. In addition, we are able to make the network larger scale.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/110 Measuring the Score Matching of the Pairwise Deoxyribonucleic Acid Sequencing using Neuro-Fuzzy 2019-11-16T10:14:37+00:00 Safa A. Hameed safa.hamid@bnu.edu.iq Raed I. Hamed safa.hamid@bnu.edu.iq <p>The proposed model for getting the score matching of the deoxyribonucleic acid (DNA) sequence is introduced; the Neuro-Fuzzy procedure is the strategy actualized in this paper; it is used the collection of biological information of the DNA sequence performing with global and local calculations so as to advance the ideal arrangement; we utilize the pairwise DNA sequence alignment to gauge the score of the likeness, which depend on information gathering from the pairwise DNA series to be embedded into the implicit framework; an adaptive neuro-fuzzy inference system model is reasonable for foreseeing the matching score through the preparation and testing in neural system and the induction fuzzy system in fuzzy logic that accomplishes the outcome in elite execution.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/111 Survey on Wireless Indoor Positioning Systems 2019-11-16T10:14:36+00:00 Wisam Hasan Ali 30088@uotechnology.edu.iq Amnah Abas Kareem 30088@uotechnology.edu.iq Manal Jasim 30088@uotechnology.edu.iq <p>Indoor positioning has finally testified a rise in interest, thanks to the big selection of services it is provided, and ubiquitous connectivity. There are currently many systems that can locate a person, be it wireless or by mobile phone and the most common systems in outdoor environments is the GPS, the most common in indoor environments is Wi-Fi positioning technique positioning. The improvement of positioning systems in indoor environments is desirable in many areas as it provides important facilities and services, such as airports, universities, factories, hospitals, and shopping malls. This paper provides an overview of the existing methods based on wireless indoor positioning technique. We focus in this survey on the strengths of these systems mentioned in the literature discordant with the present surveys; we also assess to additionally measure various systems from the scene of energy efficiency, price, and following accuracy instead of comparing the technologies, we also to additionally discuss residual challenges to correct indoor positioning.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/112 Energy Management in Wireless Sensor Networks for Internet of Things Applications 2019-11-16T10:14:35+00:00 Reem Jafar Ismail reem_aljanabe@yahoo.com Samar Jaafar Ismae reem_aljanabe@yahoo.com Wisam H. Ali reem_aljanabe@yahoo.com <p>Internet of things (IoT) aims to develop a smart world based on sensing environment. The energy management of wireless sensor networks (WSNs) is a big challenge in IoT since sensor nodes have limited energy and they need to have long life for collecting data and information. The aim of this paper is to propose an efficient energy routing algorithm in WSN and infrastructure based on construction an adaptive energy map of sensor nodes. The results show improvement in overall system performance and lifetime of WSN compared to traditional scenario.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/121 Long Time Stability Investigation for Structural and Magnetic Properties of Ti-doped Barium Ferrite 2019-11-16T10:14:29+00:00 Mohammed Abdul Malek Al Saadi mohammed.alsaadi@cihanuniversity.edu.iq <p>Barium hexaferrite (BHF) (BaFe12O19) and its substituted derivatives have been considered as the most potential magnetic candidates with considerable chemical stability and physiochemical characteristics. BHF with x ferrite ions substituted by titanium (Ti-doped BTHF) (BaTixFe12-xO19) (x=1 and x=3) was prepared from ferric oxide (Fe2O3), barium oxide (BaO), and titanium oxide (TiO2) of purity &gt;98%. The materials were mixed with deionized water and then dried at 1100°C and 1200°C overnight. For the formation of BaFe12O19 phase, the mixture was annealed at a rate of 10°C/min in static air atmosphere until reaching 1200°C and then maintained for 10 h. Structural properties of these samples were measured using X-ray diffraction (XRD) and scanning electron microscopy, while magnetic properties were measured using vibrating sample magnetometer (VSM) device. Magnetic and structural characteristics are investigated after preserving Ti-doped BHF samples at room temperature and ambient conditions for 12 years. The samples are characterized using the same previous techniques to find out the possible effect of long period storage on their properties. The results showed that the storage process has little effect on these properties where the granular size increased due to increased oxidation. XRD tests also showed the absence of Ti at low ratios due to increased oxidation of ferrite. VSM results showed increased magnetic properties after storage due to&nbsp;increased iron oxide.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/114 Performance Evaluation and Simulation of M-Ary Quadrature Amplitude Modulation Schemes with VisSim/Comm Software 2019-11-16T10:14:34+00:00 Husham Jawad Ahmad husham.jawad@cihanuniversity.edu.iq <p>M-ary modulation schemes are considered one of widely used digital modulation in practice because of its high efficiency in power and bandwidth. Therefore, this necessity the need to study and evaluate the performance of M-ary schemes using simulation techniques. In this paper, the performance of M-ary modulations schemes M-ary quadrature amplitude modulation (QAM) is considered. Because of its efficiency in power and bandwidth, M-ary QAM (M-QAM) is one of the widely used modulation techniques in practice. Therefore, a need for studying and evaluating the performance of QAM modulation schemes is an important task for designers. In this paper, M-QAM modulation schemes for even number of bits per symbol (16, 62, and 256-QAM) and an odd number of bits per symbol (32- and 128-QAM), over Additive White Gaussian Noise channel, are studied. A VisSim/Comm simulation[1] model for M-QAM is designed. Theoretical and simulation results for bit error ratio (BER) performance of QAM modulation schemes are obtained using VisSim/Comm software. The results are evaluated and compared.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/115 Simulation-based Evaluation of Mobile Ad Hoc Network Routing Protocols: Ad hoc On-Demand Distance Vector, Fisheye State Routing, and Zone Routing Protocol 2019-11-16T10:14:33+00:00 Mohamad T. Sultan mohamad.taha@cihanuniversity.edu.iq Khaled N. Yasen mohamad.taha@cihanuniversity.edu.iq Ali Q. Saeed mohamad.taha@cihanuniversity.edu.iq <p>Mobile ad hoc network (MANET) is an infrastructure-less and decentralized network without any physical connections. Nodes are mobile, free to move, and independent of each other which makes routing a difficult task. Hence, a dynamic routing protocol is needed to make MANET reliable and function properly. Several routing protocols have been proposed with different working mechanisms and performance levels. Therefore, the performance study of those protocols is needed. This paper evaluates the performance of MANET routing protocols using simulation based experiments to observe the behavior of the network as the density of the nodes increases. The paper evaluates the performance of proactive (fisheye state routing), reactive (ad hoc on-demand distance vector), and hybrid (zone routing protocol) routing protocols in terms of the packet delivery fraction, average throughput, and average end-to-end delay. The simulations of protocols to analyze their performance in different conditions were performed using the network simulator 2 (NS 2).</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/116 Capacity Analysis of Multiple-input-multiple-output System Over Rayleigh and Rician Fading Channel 2019-11-16T10:14:32+00:00 Yazen Saifuldeen Mahmood yazen.mahmood@cihanuniversity.edu.iq Ghassan Amanuel Qasmarrogy yazen.mahmood@cihanuniversity.edu.iq <p>This paper aims to analyze the channel capacity in terms of spectral efficiency of a multiple-input-multiple-output (MIMO) system when channel state information (CSI) is known using water-filling algorithm and unknown at the transmitter side which it has been shown that the knowledge of the CSI at the transmitter enhancing the performance, the random Rayleigh and Rician channel models are assumed. Ergodic capacity and outage probability are the most channel capacity definitions which are investigated in this study. MATLAB code is devised to simulate the capacity of MIMO system for different numbers of antenna nodes versus different signal-to-noise ratio (SNR) values. In addition, the outage capacity probabilities for vary transmission rate and SNR are discussed.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/117 Design and Implementation a Non-uniform Helical Antenna in Frequency Range of 450–850 MHz for Ultra-high-frequency Television Application 2019-11-16T10:14:32+00:00 Firas Muhammad Zeki firas.zeki@cihanuniversity.edu.iq Adil Hussein Mohammed Al-Dalawie firas.zeki@cihanuniversity.edu.iq <p>In a domestic region, the people are living inside cities, they complaining from the weak of local TV broadcasting signals in frequency range of 450–850 MHz, in this paper try to get a solution by increase the gain antenna by design new antenna have a wideband and high gain compare with antennas are available in the local market. A non-uniform helical antenna designed using helical antenna calculator according to equations then implemented and measured the radiation pattern and gain of antenna, then compare with commercial loop antenna gain found increase in received power about 10–12 dB more than loop antenna gain. The results of measurement applied in Matlab program to draw the pattern of the antenna.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/118 Exploiting Wavelet Transform, Principal Component Analysis, Support Vector Machine, and K-Nearest Neighbors for Partial Face Recognition 2019-11-16T10:14:31+00:00 Mustafa H. Mohammed Alhabib mustafa.alhabib1986@gmail.com Mustafa Zuhaer Nayef Al-Dabagh mustafa.alhabib1986@gmail.com Firas H. AL-Mukhtar mustafa.alhabib1986@gmail.com Hussein Ibrahim Hussein mustafa.alhabib1986@gmail.com <p>Facial analysis has evolved to be a process of considerable importance due to its consequence on the safety and security, either individually or generally on the society level, especially in personal identification. The paper in hand applies facial identification on a facial image dataset by examining partial facial images before allocating a set of distinctive characteristics to them. Extracting the desired features from the input image is achieved by means of wavelet transform. Principal component analysis is used for feature selection, which specifies several aspects in the input image; these features are fed to two stages of classification using a support vector machine and K-nearest neighborhood to classify the face. The images used to test the strength of the suggested method are taken from the well-known (Yale) database. Test results showed the eligibility of the system when it comes to identify images and assign the correct face and name.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/119 A Multiband Biconical Log-periodic Antenna for Swarm Communications 2019-11-16T10:14:30+00:00 Bessam Al Jewad bassam.jawad@cihanuniversity.edu.iq <p>In this paper, we present a specific multiband antenna design that addresses the problem of communication with unmanned aerial vehicles (UAVs). We consider a scenario where multiband single-antenna UAV communicates with the rest of the swarm members that are equipped with similar antennas. The key point in the design is that the communication does not require high or low elevation angles in most of the cases. The suggested design has a sufficient degree of freedom to select the desired features for the field pattern while keeping other features such as antenna impedance and gain relatively stable or at least in the acceptable operation region.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement## https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/120 Social Network Privacy Models 2019-11-16T10:14:30+00:00 Abdullah Abdulabbas Nahi Al-Rabeeah abdullah.nahi92@gmail.com Mohammed Mahdi Hashim abdullah.nahi92@gmail.com <p>Privacy is a vital research field for social network (SN) sites (SNS), such as Facebook, Twitter, and Google+, where both the number of users and the number of SN applications are sharply growing. Recently, there has been an exponential increase in user-generated text content, mainly in terms of posts, tweets, reviews, and messages on SN. This increase in textual information introduces many problems related to privacy. Privacy is susceptible to personal behavior due to the shared online data structure of SNS. Therefore, this study will conduct a systematic literature review to identify and discuss the main privacy issues associated with SN, existing privacy models and the limitations and gaps in current research into SN privacy.</p> 2019-08-20T00:00:00+00:00 ##submission.copyrightStatement##