Preferred Language
Articles
/
bsj-147
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main steps, at first data augmentation is done by making multiple copies of the input image then perform out-of-plane rotation on them around all the X,Y and Z axes. Then a new fast extract Region of Interest (ROI) algorithm is proposed for cropping palm region. Finally, features are extracted and classified by specific structure of Convolutional Neural Network (CNN). The system is tested on two public multispectral palm vein databases (PolyU and CASIA); furthermore, synthetic datasets are derived from these mentioned databases, to simulate the hand out-of-plane rotation in random angels within range from -20° to +20° degrees. To study several situations of pose invariant, twelve experiments are performed on all datasets, highest accuracy achieved is 99.73% ∓ 0.27 on PolyU datasets and 98 % ∓ 1 on CASIA datasets, with very fast identification process, about 0.01 second for identifying an individual, which proves system efficiency in contactless palm vein problems.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 06 2020
Journal Name
Cuestiones Políticas
Political structure and the administration of political system in Iraq (post-ISIS)
...Show More Authors

The objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Development of a Blueprint Impact System of the risks on construction projects Implementation
...Show More Authors

In Production and Operations Management the specialists  have  tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.

     The research aims to develop a blu

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
International Review Of Electrical Engineering (iree)
Enhancing Efficiency in Distribution Power Networks by Power Factor Controlling of Renewable Energy Generators: a Case Study of Iraqi Wasit Network
...Show More Authors

Integrating Renewable Energy (RE) into Distribution Power Networks (DPNs) is a choice for efficient and sustainable electricity. Controlling the power factor of these sources is one of the techniques employed to manage the power loss of the grid. Capacitor banks have been employed to control phantom power, improving voltage and reducing power losses for several decades. The voltage sag and the significant power losses in the Iraqi DPN make it good evidence to be a case study proving the efficiency enhancement by adjusting the RE power factor. Therefore, this paper studies a part of the Iraqi network in a windy and sunny region, the Badra-Zurbatya-11 kV feeder, in the Wasit governorate. A substation of hybrid RE sources is connected to this

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE LEVEL OF SUNN PEST OOPHAGOUS PARASITOIDS (HYMENOPTERA: SCELIONIDAE) IN INFESTED WHEAT FIELDS OF NORTHERN GOVERNORATE IN IRAQ WITH AN IDENTIFICATION KEY OF TRISSOLCUS SPECIS
...Show More Authors

Surveys has done for collecting Sunn Pest which been parasitized by oophagous parasitoids
in infested wheat fields of villages around Erbil, Sulimanya and Dohuk governorates from
April to the end of May 2010, the result showed that a high rat of eggs hatching was 96.3%
within Erbil governorate and its cleared from results that not all laid eggs had been hatched
normally . The percentage ratio of egg parasitism in general was low in most studied villages.
In this study: Trissolcus grandis Thompson, Trissolcus semistriotus Nees., and Telenomus sp.
on sunn pest eggs has been observed. Identification keys supported with figures were
formulated to identify of these species.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Revista Electronica De Veterinaria
The Molecular Identification of Pathogenic E. coli Isolated from Raw Cow Milk and Assessment Their Anti-susceptibility to Medical Plants at Al-Najaf city/ Iraq
...Show More Authors

Background: Toxin-producing Shiga Escherichia coli has been identified as a new foodborne pathogen that poses a significant health risk to humans. Shiga toxin-producing Escherichia coli can be found in raw cow milk and its derivatives. A small number of Escherichia coli strains that produce shiga toxin are pathogenic. Aim of study: The study aimed to see if there were any virulence genes in 50 milk samples that were typical of Entero-haemorrhagic E. coli and evaluate the Myrtus communis effects on these bacteria. Materials and Method: Milk samples were used to isolate E. coli bacteria (n= 27), biochemically analyzed, and genetically screened for virulence genes using a multiplex (PCR). The hydro-alcoholic extraction of Myrtus communis leave

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Field Study of Novel Storage Tank of Solar Water Heating System
...Show More Authors

In this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref