Iraqi Journal of Information & Communications Technology 2020-05-02T19:32:39+00:00 Prof. Dr. Mohammed Z. Al-Faiz Open Journal Systems <p>The Iraqi Journal of Information &amp; Communication Technology&nbsp;(IJICT) is a specialized, referred, and indexed journal published by the college of Information Engineering at Al–Nahrain University, Baghdad, Iraq. IJICT invites contributions from researchers, scientists and practitioners from all over the world.</p> DIGITAL CYBER FORENSIC EMAIL ANALYSIS AND DETECTION BASED ON INTELLIGENT TECHNIQUESINVESTIGATION 2020-05-02T19:32:39+00:00 Sally Dakheel Hamdi Abdulkareem M. Radhi <p style="text-align: justify;">The Internet has become open, public and widely used as a source of data transmission and exchanging messages between criminals, terrorists and those who have illegal motivations.&nbsp; Moreover, it can be used for exchanging important data between various military and financial institutions, or even ordinary citizens. One of the important means of exchanging information widely used on the Internet medium is the e-mail. Email messages are digital evidence that has been become one of the important means to adopt by courts in many countries and societies as evidence relied upon in condemnation, that prompts the researchers to work continuously to develop email analysis tool using the latest technologies to find digital evidence from email messages to assist the forensic expertise into to analyze email groups .This work presents a distinct technique for analyzing and classifying emails based on data processing and extraction, trimming, and refinement, clustering, then using the SWARM algorithm to improve the performance and then adapting support vector machine algorithm to classify these emails to obtain practical and accurate results. This framework, also proposes a hybrid English lexical Dictionary (SentiWordNet 3.0) for email forensic analysis, it contains all the sentiwords such as positive and negative and can deal with the Machine Learning algorithm. The proposed system is capable of learning in an environment with large and variable data. To test the proposed system will be select available data which is Enron Data set. A high accuracy rate is 92% was obtained in best case. The experiment is conducted the Enron email dataset corpus (May 7, 2015 Version of the dataset).</p> 2020-04-11T05:32:40+00:00 Copyright (c) 2020 Iraqi Journal of Information & Communications Technology MATERIALIZED VIEWS QUANTUM OPTIMIZED PICKING for INDEPENDENT DATA MARTS QUALITY 2020-05-02T19:31:41+00:00 Refed Adnan Talib M. J. Abbas <p style="text-align: justify;">Particular and timely unified information along with quick and effective query response times is the basic fundamental requirement for the success of any collection of independent data marts (data warehouse) which forms Fact Constellation Schema or Galaxy Schema. Because of the materialized view storage area, the materialization of all views is practically impossible thus suitable materialized views (MVs) picking is one of the intelligent decisions in designing a Fact Constellation Schema to get optimal efficiency. This study presents a framework for picking best-materialized view using Quantum Particle Swarm Optimization (QPSO) algorithm where it is one of the stochastic algorithm in order to achieve the effective combination of good query response time, low query handling cost and low view maintenance cost. The results reveals that the proposed method for picking best-materialized view using QPSO algorithm is better than other techniques via computing the ratio of query response time and compare it to the response time of the same queries on the materialized views. Ratio of implementing the query on the base table takes five times more time than the query implementation on the materialized views. Where the response time of queries through MVs access were found 0.084 seconds while by direct access queries were found 0.422 seconds. This outlines that the performance of query through materialized views access is 402.38% better than those directly access via data warehouse-logical.</p> 2020-04-11T05:33:34+00:00 Copyright (c) 2020 Iraqi Journal of Information & Communications Technology DIFFERENT FPGA PRODUCTS BASED IMPLEMENTATION OF LTE TURBO CODE 2020-05-02T19:28:36+00:00 Khadija Omran Dheeb Bayan Sabbar <p style="text-align: justify;">In the long-term evolution (LTE) physical layer, using turbo code is considered as the paramount one in error-correcting coding. This paper presents an implementation of LTE turbo decoding using the Log- Maximum a posteriori (MAP) algorithm with reduced number of required cycles approximately by 75% based on serial to parallel operation. Also an improvement for this algorithm based on polynomial regression function to reduce the implementation complexity. All this system implementation design with 40 bit block size of the input using Xilinx System Generator (XSG). This system implementation in hardware to show its applicability in real time using two approaches; Hardware Co-Simulation and HDL Netlist based on three devices, Xilinx Kintex-7, Spartan-6 and Artix-7. Observe from the hardware implementation, the system become completely real time by controlled from the user using the switches on the board. Also, this system taken the resources utilization from the devices less than other works.</p> 2020-04-11T05:34:18+00:00 Copyright (c) 2020 Iraqi Journal of Information & Communications Technology MULTI KEY ALGORITHM FOR SECURITY ENHANCEMENT OF RSA ALGORITHM USING MATLAB 2020-05-02T19:29:54+00:00 Atyaf alguraby Mohammed Joudah Zaiter <p style="text-align: justify;">In this paper, a new technique is deployed to afford a strong secure algorithm based on dynamic keys strategy. The objective of this technique is to provide confidentiality and authentication of data between any partners. The proposed technique takes Multiple keys pair(Public and Private) with RSA algorithm that used fast expansion to enhancement the speed of RSA. Simulation results have been achieved using MATLAB R2014a; Single Key RSA (SK-RSA) and proposed Multi Keys RSA (MK-RSA) are compared analysis is made on execution time. Hence, deploying the MK-RSA algorithm is proving more secure than SK-RSA algorithm.</p> 2020-04-11T00:00:00+00:00 Copyright (c) 2020 Iraqi Journal of Information & Communications Technology