Preferred Language
Articles
/
UhdJro0BVTCNdQwCFBgQ
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model was evaluated on the SDUMLA-HMT dataset, which contains a variety of biometric features from various individuals. The system outperformed existing techniques in the literature with an excellent recognition accuracy of 99.4%. Although this result is encouraging, further research on larger and more varied datasets is necessary to confirm its applicability across many circumstances. This study highlights how multimodal biometrics strengthened by metaheuristic algorithms can considerably increase biometric security against spoofing assaults, thereby opening a promising new direction for future development in the field.

Crossref
View Publication
Publication Date
Sun Dec 13 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Robust Approach of Optimal Control for DC Motor in Robotic Arm System using Matlab Environment
...Show More Authors

Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented.  The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Minar International Journal Of Applied Sciences And Technology
INVESTIGATION OF THE DENSITY OF STATE PROBABILITY FOR FE METAL CONTACT TO TIO2 SEMICONDUCTOR SYSTEM
...Show More Authors

In this paper, the density of state (DOS) at Fe metal contact to Titanium dioxide semiconductor (TiO2) has been studied and investigated using quantum consideration approaches. The study and calculations of (DOS) depended on the orientation and driving energies. was a function of TiO2 and Fe materials' refractive index and dielectric constant. Attention has focused on the effect of on the characteristic of (DOS), which increased with the increasing of refractive index and dielectric constant of Fe metal and vice versa. The results of (DOS) and its relation with and values of system have been discussed. As for contact system is increased, (DOS) values increased at first, but the relation is disturbed later and transforms into an inve

... Show More
View Publication
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 10 2024
Journal Name
Journal Of Optics
Optical signal transmission for the visible light communication system through the water–air interface link
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 29 2026
Journal Name
Al–bahith Al–a'alami
Qualitative Curricula in Social Sciences: A Crisis of Philosophy or Techniques
...Show More Authors

The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of 2 different techniques in second stage implant surgery
...Show More Authors

Background: Dental implant is one of the most important options for teeth replacement. In two stage implant surgery, a few options could be used for uncovering implants, scalpel and laser are both considered as effective methods for this purpose. The Aim of the study: To compare soft tissue laser and scalpel for exposing implant in 2nd stage surgery in terms of the need for anesthesia, duration of procedure and pain level assessment at day 1 and day 7 post operatively using visual analogue scale . Materials and methods: Ten patients who received bilateral implants participated after healing period completed, gingival depth over each implant was recorded and then implant(s) were exposed by either scalpel or laser with determination for th

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Measuring Urban Heat Island Indicators from Surface Temperature Using Spatial Techniques
...Show More Authors
Abstract<p>Using remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST </p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques
...Show More Authors

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 29 2026
Journal Name
Al–bahith Al–a'alami
Organizational reputation: A descriptive study of concept development and measurement techniques
...Show More Authors

The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.

    The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:

     Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref