Preferred Language
Articles
/
3hbSYYcBVTCNdQwC1EgC
Offline signatures matching using haar wavelet subbands
...Show More Authors

The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset for testing purpose. The results achieved by this technique indicate a high performance in signature recognition.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Causes of maternal death in Mizan Aman and Gebretsadik shawo general hospitals from 2011 – 2015: A case - control study using propensity score matching analysis
...Show More Authors

Objective: To identify causes of maternal death in Mizan Aman and Gebretsadik shawo general hospitals
Methodology: A case control study on 595 charts, 119 cases and 476 controls was conducted in Mizan
Aman & Gebretsadik shawo general hospitals. Data was analyzed by STATA 13.1. Propensity score
matching analysis was used to see causes of maternal death.
Results: Hemorrhage were the main direct causes of maternal death which accounts 47.9% (β =0.58
(95% CI (0.28,0.87)) in hospital but when projected to population based the sample (β =0.26 (95% CI
(0.22,0.31)). Followed by infection 36 (25.21%) (β = 0.50 (95% CI (0.08, 0.92)). when projected to
population based the sample PIH 7.6%) is significant cause (β = 0.16

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPROVED IMAGE COMPRESSION BASED WAVELET TRANSFORM AND THRESHOLD ENTROPY
...Show More Authors

In this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
J. Appl. Sci
Watermarking based Fresnel transform, wavelet transform, and chaotic sequence
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Dec 01 2012
Journal Name
2012 Ieee-embs Conference On Biomedical Engineering And Sciences
Compatibility of mother wavelet functions with the electroencephalographic signal
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Advanced Computer Science And Applications
Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms
...Show More Authors

View Publication
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 06 2024
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Wavelet Transformations to Estimate Nonparametric Regression Function
...Show More Authors

The purpose of this article is to improve and minimize noise from the signal by studying wavelet transforms and showing how to use the most effective ones for processing and analysis. As both the Discrete Wavelet Transformation method was used, we will outline some transformation techniques along with the methodology for applying them to remove noise from the signal. Proceeds based on the threshold value and the threshold functions Lifting Transformation, Wavelet Transformation, and Packet Discrete Wavelet Transformation. Using AMSE, A comparison was made between them , and the best was selected. When the aforementioned techniques were applied to actual data that was represented by each of the prices, it became evident that the lift

... Show More
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Hand Gesture Recognition With Acoustic Myography and Wavelet Scattering Transform
...Show More Authors

View Publication Preview PDF
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref