Iraqi Journal of Information and Communication Technology https://ijict.edu.iq/index.php/ijict <p>The Iraqi Journal of Information &amp; Communication Technology (IJICT) is a quarterly published specialized, referred, and indexed journal published by the college of Information Engineering at Al–Nahrain University, Baghdad, Iraq. IJICT invites contributions from researchers, scientists and practitioners from all over the world.</p> College of Information Engineering | Al-Nahrain University en-US Iraqi Journal of Information and Communication Technology 2222-758X Experimental Realization of Quantum Cryptography by Arduino https://ijict.edu.iq/index.php/ijict/article/view/204 <p>This paper is concerned with the experimental realization of an Arduino-based quantum cryptography system, in which a setup of five laser diodes is constructed in the transmitter that randomly emits photons to encode information consisting of a sequence of "0" and "1" bits. The receiver contains five photoresistor sensors that detect the presence or absence of light as well as determine the intensity of the light. Laser light is used to securely transmit data, such as text or numbers, in this technology.</p> Harith A. Qaisi M. F. Al-Gailani Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 1 8 10.31987/ijict.6.1.204 Oil and Gas pipelines monitoring using IoT platform https://ijict.edu.iq/index.php/ijict/article/view/209 <p>The early detection of pipeline breaches in the pipeline monitoring system is a crucial concern for oil management firms. Diverse technologies have been created to identify pipeline leaks. However, they need development as the current systems take a long time to detect leaks. As a result, it can contribute to oil waste and natural disasters. This paper provides a system for detecting pipeline leaks using pressure, water-flow, Accelerometer, and voltage sensors coupled to an Arduino mega microcontroller with BLYNK IoT platform real-time monitoring. It is obvious from the data that the Oil Pipe Monitoring System is capable of displaying pipeline flowrates, pressures, and acceleration. When a leak occurs or an event occurs during operation, a message is delivered to the responsible technical individual indicating which pipe is leaking. This project successfully established an Internet of Things (IoT) platform to monitor pipeline events in real-time.</p> Ahmed K. Yas Ammar Al Qassab Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 9 27 10.31987/ijict.6.1.209 PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD https://ijict.edu.iq/index.php/ijict/article/view/212 <div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p><span style="font-size: 10.000000pt; font-family: 'NimbusRomNo9L'; font-weight: 500;">Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on text. It has been hypothesized that graphical passwords are more difficult to crack using a brute force technique or to figure out through guessing. This paper proposes an authentication system based on a graphical password method. The proposed system computes the password points using histogram arithmetic and encrypts the chosen password points using SHA512. The envisioned system has been realized as an android application and evaluated with existing research considering multiple measurements such as required login time, password space, and entropy. The findings reveal that the new suggested system outperforms the reference work by more than 85% in terms of login latency and more than 72% in terms of entropy results. </span></p> </div> </div> </div> Safa F. Abbas Lahieb M. Jawad Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 28 39 10.31987/ijict.6.1.212 IMPROVING DETECTION FOR INTRUSION USING DEEP LSTM WITH HYBRID FEATURE SELECTION METHOD https://ijict.edu.iq/index.php/ijict/article/view/213 <p>Due to the importance of the intrusion detection system, which is considered supportive of enhancing network security. Therefore, we seek to increase the efficiency of intrusion detection systems through the use of deep learning mechanisms. However, intrusion detection algorithms still suffer from problems in the process of classification and determining the presence and type of attack, which causes a decrease in the detection rate, an increase in the number of false alarms, and reduces system performance. This is due to a large number of redundant features that are not relevant to the dataset. To find the&nbsp; solve for this problem, here propose a hybrid algorithm based on the use of the feature selection technique, which helps in reaching the goal optimally by choosing the best and most important features. And it works by integrating three ways to minimize the features by deleting the static features, that do not have much value from the information gain and is done before the training stage by the deep learning model of LSTM as&nbsp; preprocessing for the CSE-CIC-IDS data set, which helps in improving the performance of the system By minimizing the time for processing and increasing the detection rate and accuracy ratio. The results of the experiment showed a high accuracy of 99.84%.</p> Baraa I. Farhan Ammar D. Jasim Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 40 50 10.31987/ijict.6.1.213 Cellular Phone Number Tracking System Based on ArcGIS and Google Maps https://ijict.edu.iq/index.php/ijict/article/view/215 <p>Over 4 billion individuals are projected to own a mobile device, with smartphone use continuing to rise around the world. Associated with this trend is the collection and usage of location information provided by these devices. The procedure for tracking and evaluating a mobile phone number is crucial for crime and terrorist attacks preventing concerns, especially in countries with deteriorated security conditions. The locational tracking information can enable real-time operational awareness and can save people's lives. In this aspect, the Geographic Information System (GIS) system is frequently used to provide intensive spatial information along the tracking process. <br />This research aims to examine, follow up on, and trace a certain person's phone number inside a certain area using a combination of ArcGIS and Google Maps application software they are programs used to track and determine locations through the use of various types of coordinates, including latitude and longitude. In the ArcGIS program, there are several methods and algorithms used in various fields, including (locating people, determining tourist places, determining water and sewage networks, forecasting in the event of storms or floods, and many other areas), an example of these methods in the program is (Kriging method, Idw method, Spline method) and many other methods, each method is used for a specific purpose and field. In this research, the kriging method was used, which is a design algorithm that is used in many analysis and tracking processes and gives clear and accurate results. The process of determining locations in the maps used in the search depends on taking the longitude and latitude coordinates and downloading them to those maps. The maps that have been worked on in the research provide a set of basic concepts adopted in the process of tracking a particular person’s phone number, such as (the person’s location, the numbers connected to him, and the duration of a call to numbers in his contact list). The tracking system used is tested by creating a virtual contact list for a specific person’s phone number and making use of all the data in the contact list and applying it in the ArcGIS program, knowing that the duration of the contact list used is 9 months (from January to October 2021). <br />The obtained results are analyzed and sorted in different ways to provide a wide model of the locational communication and movement activity of the tracked person. They showed that the system is efficient and can be applied to enhance the security in Iraq for tracking suspected people in crimes like terrorism, kidnapping, drugs, extortion … etc.</p> Ameer I. Ghazi Hikmat N. Abdullah Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 51 65 10.31987/ijict.6.1.215 FACE DETECTION AND RECOGNITION USING GOOGLE-NET ARCHITECTURE https://ijict.edu.iq/index.php/ijict/article/view/228 <p><strong>Using face detection to secure places is an important application merging with machine vision. This paper reposed a system to do face detection and recognition using existing architecture google-net and transfer learning to let the network learn images based on pre-trained architecture, The design of a network leads to an architecture that leads to maximizing the accuracy of the system and accurately detecting faces that are saved to the database and specifying the effect of weights used within the nodes of the hidden layer which consider the most time-consuming task within the architecture. The main characteristics are explained and the architecture used as well as the used data set in detail with the design of a network which provides an architecture that leads to maximizing the accuracy of the system and accurately detecting faces that are saved to the database and specifying the effect of weights used within the nodes of the hidden layer which consider the most time-consuming task within the architecture. Experimental results show using epochs 10 and 100 samples imply 98.37% training accuracy whereas other numbers of epochs either provide less accuracy or consume more time, and the number of epochs and training samples can be modified according to the system requirements. Other factors like illumination, the color of the background, and face rotation or scale were discussed as impact factors.</strong></p> Basmal S. Mahmmed Ammar I. Majeed Copyright (c) 2023 Iraqi Journal of Information and Communication Technology 2023-04-30 2023-04-30 6 1 66 79 10.31987/ijict.6.1.228