Preferred Language
Articles
/
bsj-8362
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Structural Systems for Modern Architecture in Iraq Analysis Study to Dr. Qahtan Al-Madfa’i’s Architecture

Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.

      In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA

استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA

Crossref
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analyzing Laser Speckle Pattern Using the Discrete Cosine Transform

The use of Cosine transform to analyze the model-noise pattern alteration with different vibration model applied on multimode fiber optics are studied. It's results compared with the Fourier transform to perform the same analysis using total frequency difference and the computation time, which almost coincide for the both transforms. A discussion for the results and recommendation are introduced.

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Scopus (22)
Crossref (23)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RESPONSE OF FABA BEAN TO PLANTING DISTANCE BETWEEN PLANTS AND SPRAYING WITH NANO AND TRADITIONAL BORON: RESPONSE OF FABA BEAN TO PLANTING DISTANCE BETWEEN PLANTS AND SPRAYING WITH NANO AND TRADITIONAL BORON

A field experiment was conducted during winter season of 2021 at a research station of college of agricultural engineering sciences, university of Baghdad to determine the response of active fertility percentage and seed yield and its components of faba bean (Vicia faba L. cv. Aguadulce) to distance between plants and spraying of nano and traditional boron. A Randomized Complete Block Design according to split-plots arrangement was used at three replicates. The main plots were three distances between plants (25, 35 and 45 cm), while the sub plots including spraying of distilled water only (control treatment), spraying of boron at a 100 mg L-1 and spraying of nano boron at two concentrations (1

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Study the Impact of the Distance Factor on the Optimal Workable Frequencies for the Long Distance Radio Communications

In this research, the influence of the distance factor on the optimal working
frequency (FOT) parameter has been studied theoretically for the ionosphere layer
over the Middle East Zone. The datasets of the (FOT) parameter have been
generated using the (VOACAP) model which considers as one of the recommended
modern international communication models that used to calculate the ionosphere
parameters. The calculations have been made for the connection links between the
capital Baghdad and many other locations that distributed on different distances and
directions over the Middle East region. The years (2011-2013) of the solar cycle 24
have been adopted to study the influence of the distance factor on the FOT
param

... Show More
View Publication Preview PDF