Preferred Language
Articles
/
bsj-147
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main steps, at first data augmentation is done by making multiple copies of the input image then perform out-of-plane rotation on them around all the X,Y and Z axes. Then a new fast extract Region of Interest (ROI) algorithm is proposed for cropping palm region. Finally, features are extracted and classified by specific structure of Convolutional Neural Network (CNN). The system is tested on two public multispectral palm vein databases (PolyU and CASIA); furthermore, synthetic datasets are derived from these mentioned databases, to simulate the hand out-of-plane rotation in random angels within range from -20° to +20° degrees. To study several situations of pose invariant, twelve experiments are performed on all datasets, highest accuracy achieved is 99.73% ∓ 0.27 on PolyU datasets and 98 % ∓ 1 on CASIA datasets, with very fast identification process, about 0.01 second for identifying an individual, which proves system efficiency in contactless palm vein problems.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
2019 4th Scientific International Conference Najaf (sicn)
Pneumatic Control System of Automatic Production Line Using SCADA Implement PLC
...Show More Authors

View Publication
Scopus (22)
Crossref (19)
Scopus Crossref
Publication Date
Mon Feb 02 2015
Journal Name
Al-khwarizmi Engineering Journal
Stabilizing Gap of Pole Electric Arc Furnace Using Smart Hydraulic System
...Show More Authors

Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Design of Light Trapping Solar Cell System by Using Zemax Program
...Show More Authors

View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Cleaner Production
Modeling of biogas production and biodegradability of date palm fruit wastes with different moisture contents
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Mar 19 2021
Journal Name
Annals Of The Romanian Society For Cell Biology 25 (6), 10203-10208‏
Effect of Boron Spray and Pollination Methods on “Zahdi” Date Palm Yield and Fruits Quality‏
...Show More Authors

Publication Date
Thu Jan 15 2009
Journal Name
Basrah Journal For Date Palm Research 8 (1), 64-71‏
Survey study of ten rare cultivars of Date Palm Phoenix dactylifera L. in Basrah city‏
...Show More Authors

Publication Date
Tue Oct 01 2013
Journal Name
International Journal Of Biological Macromolecules
Characterization and determination of lignin in different types of Iraqi phoenix date palm pruning woods
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref