Preferred Language
Articles
/
bsj-8362
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Complexity
Complexity Measures for Quantifying Changes in Electroencephalogram in Alzheimer’s Disease
...Show More Authors

Alzheimer’s disease (AD) is a progressive disorder that affects cognitive brain functions and starts many years before its clinical manifestations. A biomarker that provides a quantitative measure of changes in the brain due to AD in the early stages would be useful for early diagnosis of AD, but this would involve dealing with large numbers of people because up to 50% of dementia sufferers do not receive formal diagnosis. Thus, there is a need for accurate, low-cost, and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, electroencephalogram (EEG) based biomarkers can play a vital role in early diagnosis of AD as they can fulfill these needs. This is a cross-sectional study that aims to demon

... Show More
View Publication Preview PDF
Scopus (67)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
MyBotS Prototype on Social Media Discord with NLP
...Show More Authors

The continuous growth in technology and technological devices has led to the development of machines to help ease various human-related activities. For instance, irrespective of the importance of information on the Steam platform, buyers or players still get little information related to the application. This is not encouraging despite the importance of information in this current globalization era. Therefore, it is necessary to develop an attractive and interactive application that allows users to ask questions and get answers, such as a chatbot, which can be implemented on Discord social media. Artificial Intelligence is a technique that allows machines to think and be able to make their own decisions. This research showed that the dis

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Political Sciences Journal
بصمات الذاكرة التاريخية في الحياة الوطنية العراقية
...Show More Authors

بصمات الذاكرة التاريخية في الحياة الوطنية العراقية

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Structural Systems for Modern Architecture in Iraq Analysis Study to Dr. Qahtan Al-Madfa’i’s Architecture
...Show More Authors

Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.

      In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Neuromorphic Architecture for the Hierarchical Temporal Memory
...Show More Authors

View Publication
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref