Preferred Language
Articles
/
bsj-8362
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compared to traditional image filtering techniques. This paper aimed to utilize a specific CNN architecture known as AlexNet for the fingerprint-matching task. Using such an architecture, this study has extracted the significant features of the fingerprint image, generated a key based on such a biometric feature of the image, and stored it in a reference database. Then, using Cosine similarity and Hamming Distance measures, the testing fingerprints have been matched with a reference. Using the FVC2002 database, the proposed method showed a False Acceptance Rate (FAR) of 2.09% and a False Rejection Rate (FRR) of 2.81%. Comparing these results against other studies that utilized traditional approaches such as the Fuzzy Vault has demonstrated the efficacy of CNN in terms of fingerprint matching. It is also emphasizing the usefulness of using Cosine similarity and Hamming Distance in terms of matching.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Decorative aesthetic aspects and their use in Islamic architecture
...Show More Authors

The architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Signals And Communication Technology
Survey on Twitter Sentiment Analysis: Architecture, Classifications, and Challenges
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Virology
Chloroviruses Lure Hosts through Long-Distance Chemical Signaling
...Show More Authors

Viruses have not previously been reported to act as chemotactic/chemoattractive agents. Rather, viruses as extracellular entities are generally viewed as non-metabolically active spore-like agents that await further infection events upon collision with appropriate host cells. That a virus might actively contribute to its fate via chemotaxis and change the behavior of an organism independent of infection is unprecedented.

View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Utilizing the ATM technology in e-distance learning
...Show More Authors

<p>There is an Increasing demand for the education in the field of E-learning specially the higher education, and to keep contiuity between the user and the course director in any place and time. This research presents a proposed and simulation multimedia network design for distance learning utilizing ATM technique. The propsed framework determines the principle of ATM technology and shows how multimedia can be integrated within E- learning conteext. The first part of this research presents a theoretical design for the Electricity Department, university of technology. The purpose is to illustrate the usage of the ATM and Multimedia in distance learning process. In addition, this research composes two entities: Software entity

... Show More
View Publication
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (5)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Identify Similarities and Differences between the IIA Standards and the Guide Work ofthe Internal Audit in Iraq
...Show More Authors

This study aimed at an analytical comparison of the Internal Auditing Standards issued by the Institute of Internal Auditors (IIA) and the Guidance Manual for Audit Units issued by the Federal Audit Bureau to show the compatibility and differences between them and the possibility of applying the IIA standards to economic units in Iraq. The guideline was generally not covered by all the internal audit units. There is a lack of keeping pace with changes in internal auditing at the international level and there is a need to strengthen the Guideline on Internal Auditing Standards II A), which is characterized by the preparation of an internal document containing the objectives, powers and responsibilities of the internal audit work as well a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref