Preferred Language
Articles
/
ChZUZYoBVTCNdQwCdJ3M
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (Ecl) distance match performance is (62%) in MWM. So, in speech recognition to get the high alignment and high performance one must use DTW distance measurement.

Crossref
View Publication
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
FM Based Localization: A Proposed Improvement
...Show More Authors

Localization is an essential issue in pervasive computing application. FM performs worse in some indoor environment when its structure is same to some extent the outdoor environment like shopping mall. Furthermore, FM signal are less varied over time, low power consumption and less effected by human and small object presence when it compared to Wi-Fi. Consequently, this paper focuses on FM radio signal technique and its characteristics that make it suitable to be used for indoor localization, its benefits, areas of applications and limitations.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Congenital adrenal hyperplasia: hospital based study
...Show More Authors

Background: Congenital adrenal hyperplasia is a family of autosomal recessive disorders of cortisol biosynthesis. Depending on the enzymatic step that is deficient, there may be signs, symptoms, and laboratory findings of mineralocorticoid deficiency or excess; incomplete virilization or premature puberty in affected males; and virilization or sexual infantilism in affected females. The most frequent is 21-hydroxylase enzyme deficiency, accounting for more than 90% of cases.
Objectives: to review cases of congenital adrenal hyperplasia registered in children welfare teaching hospital- medical city- Baghdad.
Patients and method: This study included all patients who were presented and registered in the e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Childhood Lymphoblastic Lymphoma: Hospital Based Study.
...Show More Authors

Background: Lymphoblastic lymphomas (LBL) are neoplasms of precursor T cells and B cells, or lymphoblasts. The term lymphoblastic lymphoma has been used to describe predominantly lymph node– based disease; however, clinical distinction between LBL and acute lymphoblastic leukemia (ALL) has been arbitrary and has varied among different studies and institutions
Objectives: To determine the frequency of LBL among all Non-Hodgkin’s lymphoma (NHL) patients in children and to study the clinical and pathological features of LBL and assess the treatment outcome.
Methods: A retrospective study included 28 children with newly diagnosed LBL (based on morphology) below the age of 14 years over 8 years period from J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (1)
Scopus
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison between HSV-1 Ag detection techniques by ELISA and real-time PCR in breast cancer patients suffering from periodontitis
...Show More Authors

Background: Periodontitis is a long-standing infection that destroys the gums, periodontal ligaments, and the alveolar bone that supports the teeth. Inflammation of the gums and chronic periodontitis are both caused by the bacteria in the dental plaque and the herpes viruses, especially types 1 and 2 of the herpes simplex virus.

Objectives: To compare the ELISA and real-time PCR as ways to detect the herpes simplex virus in breast cancer pat

J Fac Med Baghdad

2023; Vol.65, No. 3

Received:March., 2023

Accepted: June. 2023

Published: Oct. 2023

 

... Show More
View Publication Preview PDF
Crossref