Preferred Language
Articles
/
bsj-6322
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed system's performance. method, the classification accuracy has been compared using different types of classifiers. These classifiers are Naïve Bayesian, KNN, J48, and SVM. The range of the identification accuracy for all the processed databases using the proposed scenario is between (%93.8- %97.8). The system was executed using MATHLAB R2017, 2.10 GHz processor, and 4 GB RAM.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Controlling the wavelength of a high power diode laser using thermoelectric cooler
...Show More Authors

The present work includes a design and characteristics study of a controlling the wavelength of high power diode laser by thermoelectric cooler [TEC] . The work includes the operation of the [TEC] to control the temperature of the diode laser between ( 0- +30) °C by changing the resistance of thermistor. We can control a limited temperature of a diode laser by changing the phase cooling between hot and cold faces of the diode, this process can be attempted by comparator type [LM –311] .The theoretical results give a model for controlling the temperature with, the suitable wavelength.

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Solar Energy
A review of studies on using nanofluids in flat-plate solar collectors
...Show More Authors

Continuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll

... Show More
Scopus (135)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms
...Show More Authors

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th

... Show More
Scopus (17)
Crossref (7)
Scopus Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The phenomenon of Corruption and its impact on the growing problem of Unemployment in Iraq after a year ( 2003 ).
...Show More Authors

        Corruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultura

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (3)
Scopus
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF