Preferred Language
Articles
/
ZRdnMI8BVTCNdQwCBV8p
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the original image. A lossless Hexadata encoding method is then applied to the data, which is based on reducing each set of six data items to a single encoded value. The tested results achieved acceptable saving bytes performance for the 21 iris square images of sizes 256x256 pixels which is about 22.4 KB on average with 0.79 sec decompression  average time, with high saving bytes performance for 2 iris non-square images of sizes 640x480/2048x1536 that reached 76KB/2.2 sec, 1630 KB/4.71 sec respectively, Finally, the proposed promising techniques standard lossless JPEG2000 compression techniques with reduction about 1.2 and more in KB saving that implicitly demonstrating the power and efficiency of the suggested lossless biometric techniques.

Crossref
View Publication
Publication Date
Sun Dec 21 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Compressive Strength of Bottle-Shaped Compression Fields of Fiber Reinforced Concrete Members
...Show More Authors

Applying load to a structural member may result in a bottle-shaped compression field especially when the width of the loading is less than the width of bearing concrete members. At the Building and Construction Department – the University of Technology-Iraq, series tests on fibre reinforced concrete specimens were carried out, subjected to compression forces at the top and bottom of the specimens to produce compression field. The effects of steel fibre content, concrete compressive strength, transverse tension reinforcement, the height of test specimen, and the ratio of the width of loading plate to specimen width were studied by testing a total of tenth normal strength concrete blocks with steel fibre and one normal s

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Oral Disintegrating Tablets of Ketoprofen by Dirct Compression
...Show More Authors

Ketoprofen is a non-steroidal anti-inflammatory (NSAID) drug with analgesic, anti-inflammatory, and antipyretic effects. It is widely used in the treatment of inflammation and pain associated with rheumatic disorders such as rheumatoid arthritis, osteoarthritis, and in soft tissue injury. The purpose of this study was to prepare an  oral disintegrating tablets of ketoprofen by simple method. The tablets were prepared by direct compression method and different ratios of various subliming agents or superdisintegrants were incorporated. Then these tablets were evaluated for hardness, friability, weight variation, water absorption ratio, disintegrating time and dissolution time. The results showed that Formula F11 batch had short disint

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Journal Of Engineering Science And Technology. Journal Of Engineering Science And Technology
Grey-Level Image Compression Using 1-D Polynomial and Hybrid Encoding Techniques
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Experimental Evaluation of Thermal Performance of Solar Assisted Vapor Compression Heat Pump
...Show More Authors

The thermal performance of indirect expansion solar assisted heat pump, IX-SAHP, was investigated experimentally under Iraqi climate. An Indirect-Solar Assisted Heat Pump system was designed, built, instrumented and tested. Experimental tests were conducted by varying the controlling parameters to investigate their effects on the thermal performance of the IX-SAHP such as cooling water flow rate, heating water flow rate, ambient temperature and solar radiation intensity. The investigation covered values of cooling water flow rate of (2, 3, 4, 5 l/min) and heating water flow rate of (2, 3, 4, 5 l/min) under meteorological condition of Baghdad from November 2014 to January 2015.

The results indicated that the performance of the IX-

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Dna Repair
The interactions between DNA methylation machinery and long non-coding RNAs in tumor progression and drug resistance
...Show More Authors

DNA methylation is one of the main epigenetic mechanisms in cancer development and progression. Aberrant DNA methylation of CpG islands within promoter regions contributes to the dysregulation of various tumor suppressors and oncogenes; this leads to the appearance of malignant features, including rapid proliferation, metastasis, stemness, and drug resistance. The discovery of two important protein families, DNA methyltransferases (DNMTs) and Ten-eleven translocation (TET) dioxygenases, respectively, which are responsible for deregulated transcription of genes that play pivotal roles in tumorigenesis, led to further understanding of DNA methylation-related pathways. But how these enzymes can target specific genes in different malignancies;

... Show More
View Publication
Scopus (17)
Crossref (19)
Scopus Clarivate Crossref