Preferred Language
Articles
/
YReTP48BVTCNdQwCBGbf
A new proposed statistical feature extraction method in speech emotion recognition

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Artificial Intelligence
Scopus (22)
Crossref (19)
Scopus Crossref
View Publication
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Arabic Handwriting Word Recognition Based on Scale Invariant Feature Transform and Support Vector Machine

Offline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters.  In this paper a proposed method for Offline Arabic handwritten recognition. The   proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and   support vector machines (SVMs) to enhance the recognition accuracy. The proposed method  experimented using (AHDB) database. The experiment result  show  (99.08) recognition  rate.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iec2017 Proceedings Book
Crossref (2)
Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
Scopus (15)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Crossref (1)
Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Assay of Orphenadrine Citrate in Pharmaceuticals via Extraction-Spectrophotometric Method

An extraction-spectrophotometric technique has been applied and approved for the estimation of orphenadrine citrate in the presence of paracetamol in a binary synthetic mixture and in combined drugs. The procedure is built on the formation of a soluble red colour orphenadrine citrate – eriochrom black T (EBT) ion pair complex at pH 1.40, while the paractamol not paired. The produced red colour ion-pair complex was extracted with chloroform and showed maximum absorption at 509 nm. For quantitative evaluation Beer’s law applied to plot the absorbance against concentration, the relation was a linear in the concentration range of 0.10-6.00 µg/ mL with the molar absorptivity 4.4025 x104 L / mol. cm. The limit of detection and

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Ieee Transactions On Human-machine Systems
Scopus (13)
Crossref (11)
Scopus Clarivate Crossref
View Publication