Preferred Language
Articles
/
WhY6YIcBVTCNdQwCa0h9
Fingerprints Recognition Using the Local Energy Distribution over Haar Wavelet Subbands
...Show More Authors

Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds 80 fingers with 8 samples per finger. The attained test results showed encouraging system capability to recognize low quality fingerprint images although with presence of partial loss in fingerprint images.

View Publication
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Advanced Research In Computer Engineering & Technology
Facial Emotion Recognition: A Survey
...Show More Authors

Emotion could be expressed through unimodal social behaviour’s or bimodal or it could be expressed through multimodal. This survey describes the background of facial emotion recognition and surveys the emotion recognition using visual modality. Some publicly available datasets are covered for performance evaluation. A summary of some of the research efforts to classify emotion using visual modality for the last five years from 2013 to 2018 is given in a tabular form.

Preview PDF
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Fri Jul 04 2025
Journal Name
Computational And Theoretical Chemistry
Coronene and BN isosters of coronene: Revealing the electron density distribution using magnetic shielding maps
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Nov 13 2023
Journal Name
مجلة الدراسات المستدامة
The American-European dispute over control Spanish colonies in the Ameri
...Show More Authors

The American-European dispute is one of the important issues that dominated international relations during the nineteenth century in particular, although the previous period witnessed the emergence of a dispute over the right to control these colonies, which the United States of America, especially after the proclamation of the Monroe Doctrine in 1823, is a natural right and that It has the ability to prevent European countries from interfering in the affairs of the American continent, so the United States of America entered into continuous disputes with European countries, which were constantly directing their eyes towards the Spanish colonies in the American continent. But the American government had priority in controlling those colonies

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
View Publication
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of College Of Education
Recognition the Arabic Characters Based on the Characteristics of Arabic Language
...Show More Authors