Preferred Language
Articles
/
bsj-2949
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Identify trends of media students about satellite channels specialized and its role in the satisfaction of their wishes and develop their abilities
...Show More Authors

This search is field research, which aims to explore the trends of students in media department toward specialized Satellite Channels and identify the knowledge capacity and its role in the development of their knowledge’s, represented by watching those channels as well as media students' habits exposed by those channels. As to the public is a key element in the process and substantive communication, the Sociological studies information on that article information is not complete its work, but that he was receiving from before receiving, and send every piece of information content in order to achieve a certain goal, therefore, is the future of receiving such information in order to achieve a particular goal, which is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo

... Show More
Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (1)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Numerical Solutions for the Nonlinear PDEs of Fractional Order by Using a New Double Integral Transform with Variational Iteration Method
...Show More Authors

This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient

View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2024
Journal Name
مجلة الكوفة للعلوم القانونية والسياسية
MANIPULATION OF SOFT POWER IN THE US COMPREHENSIVE STRATEGY TOWARDS FRANCE AFTER 2001
...Show More Authors

Although the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic

... Show More
View Publication
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Middle age Women's Knowledge towards Household Hazards in AL –Amara City
...Show More Authors

Objective: The aim of the study is assessing middle age women's knowledge toward household hazards, In primary health care centers at AL-Amara City. Methodology: A descriptive and analytic design is accomplish on non probability (Purposive sample) consisting of 150 middle age women select from four primary health care centers at AL-Amara City (AL-Uroba Primary Health Care Center,AL Zahraa Primary Health Care Center ,AL Hasen AL-Askerry Primary Health Care Center ,and Ali AL-Ridha Primary Health Care Center.) These centers are choose randomly from 21 primary health care centers in the first sector. The study is

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Primary School Science Teachers' Knowledge towards Health Promotion in Baghdad City
...Show More Authors

Objective: Assessment of primary schools science teachers' knowledge towards health promotion in Baghdad City.
Methodology: A descriptive study was conducted at (100) primary school at Al-Rasafa, and Al-Karkh sectors in
Baghdad City, from November 29th 2007 to January 20th 2009. A probability stratified random sample of (100)
teachers who teach science subject was selected, and had at least one year of employment in the teaching field. A
questionnaire format was used which was consisted of (2) parts. The overall number of the items included in the
questionnaire were (205) items. The first part was related to the demographic data of the teachers, the second part
(six sections) was concerned with teachers' knowledge about

... Show More
View Publication Preview PDF