Preferred Language
Articles
/
ZRdnMI8BVTCNdQwCBV8p
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the original image. A lossless Hexadata encoding method is then applied to the data, which is based on reducing each set of six data items to a single encoded value. The tested results achieved acceptable saving bytes performance for the 21 iris square images of sizes 256x256 pixels which is about 22.4 KB on average with 0.79 sec decompression  average time, with high saving bytes performance for 2 iris non-square images of sizes 640x480/2048x1536 that reached 76KB/2.2 sec, 1630 KB/4.71 sec respectively, Finally, the proposed promising techniques standard lossless JPEG2000 compression techniques with reduction about 1.2 and more in KB saving that implicitly demonstrating the power and efficiency of the suggested lossless biometric techniques.

Crossref
View Publication
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Gait Recognition Based on Deep Learning
...Show More Authors

      In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 05 2021
Journal Name
Review Of International Geographical Education Online
Measuring The Efficiency of The Departments of The College of Administration and Economics / University of Baghdad Using the Method of Data Envelopment Analysis (DEA), A Comparative Study
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Measuring The Efficiency of The Departments of The College of Administration and Economics / University of Baghdad Using the Method of Data Envelopment Analysis (DEA), A Comparative Study
...Show More Authors

The research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on

... Show More
Scopus
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
The Use of Seismic Reflection Data Inversion Technique to Evaluate the Petro- Physical Properties of Nahr Umr Formation at Kumait and Dujaila Oil Fields – Southern Iraq
...Show More Authors

The estimation of rock petrophysical parameters is an essential matter to characterize any reservoir. This research deals with the evaluation of  effective porosity (Pe), shale volume (Vsh) and water saturation (Sw) of reservoirs at Kumait and Dujalia fields, which were analyzed from well log and seismic data. The absolute acoustic impedance (AI) and relative acoustic impedance (RAI) were derived from a model which is based on the inversion of seismic 3-D post-stack data. NahrUmr formation’s sand reservoirs are identified by the RAI section of the study area. Nahr Umr sand-2 unit in Kumait field is the main reservoir; its delineation depends on the available well logs and AI sections information. The results of well logging i

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Egyptian Journal Of Botany
Molecular data unravels three freshwater peridinioids in the Baghdad Island Tourist Lake, with reporting Palatinus apiculatus (Peridiniopsidaceae, Peridiniales) as a new record for the Iraqi algal flora
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Indicative coding of the actor’s performance in the Iraqi theater show: راسل كاظم عوده
...Show More Authors

Summary Search Alachtgalat process semantic encoding carried out by the actor inside the theater to deliver the intellectual sense, and social, as well as the aesthetic to the recipient, the fact that the code is the function is operated relationship in accordance with the prior intent to deliver the implications of a particular intent, too, and the fact that encryption is the best way to transfer messages in system theater, where should the actor that has the ability to create images (sensory) or intellectual new in human consciousness on the basis of conversion of impressions collected from reality and re technically formed inside the theater, allowing the recipient to arrange these marks to obtain the meaning that lies in them. So he

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Image Signal Decomposition Using Polynomial Representation with Hybrid Lossy and Non-Lossy Coding Scheme
...Show More Authors

This article presents a polynomial-based image compression scheme, which consists of using the color model (YUV) to represent color contents and using two-dimensional polynomial coding (first-order) with variable block size according to correlation between neighbor pixels. The residual part of the polynomial for all bands is analyzed into two parts, most important (big) part, and least important (small) parts. Due to the significant subjective importance of the big group; lossless compression (based on Run-Length spatial coding) is used to represent it. Furthermore, a lossy compression system scheme is utilized to approximately represent the small group; it is based on an error-limited adaptive coding system and using the transform codin

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref