Preferred Language
Articles
/
dhds7pEBVTCNdQwCh5zh
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2006
Journal Name
College Of Education For Women
The Image of the Teacher in Selected Novels by Kingsley Amis Muriel Spark and C. P. Snow
...Show More Authors

The study introduces the twentieth century background where the image of teacher is shaped by various factors according to the wide emergence of new educational institutions in the aftermath of the Second World War. A group of writers mirrored the influence of the war on educational institutions and accordingly on the image of teacher in their novels whose main action is set in and around the campus of a university. The genre dates back to the nineteen forties. where they show the foibles of human nature and reactions to external pressures. One of the early examples of this genre is Lucky Jim (1954). The image of teacher is swinged in many shapes from the tyrant to the rebellion to the defiant. All is personified in the characters of these

... Show More
View Publication
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Constant and the Variable in the Aesthetic Image of the Theatrical Direction: حازم عبد المجيد إسماعيل
...Show More Authors

The theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Civil Engineering Journal
The Effect of Oil Contaminated on Collapse Pattern in Gypseous Soil Using Particle Image Velocimetry and Simulation
...Show More Authors

Gypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Design & Nature And Ecodynamics
Artificial Neural Network Assessment of Groundwater Quality for Agricultural Use in Babylon City: An Evaluation of Salinity and Ionic Composition
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Research In Medical And Dental Science
Evaluation of Bond Strength of Acrylic Artificial Teeth with Unreinforced and Nano Silica Reinforced Denture Base Material after Chemical Disinfection
...Show More Authors

Soaking dentures with disinfection solutions is an effective way of keeping dentures in a healthy status; however, immersions in these solutions have a negative effect on the bond strength of denture base and denture teeth. The aim of this study was to evaluate the bond strength between denture acrylic teeth and heat-cured Poly (methyl methacrylate) denture base material (with and without nano silica) after disinfection with different chemical disinfectants for a simulated period of six months. One hundred specimens of maxillary central incisors attached to PMMA were divided into two groups; 50 specimens of PMMA without nano silica and 50 specimens of PMMA reinforced with 5 wt% of nano silica. Specimens of each group were immersed in five i

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation the Incidence of Genotoxic Effects of Artificial Food Favoring Additives in Bone Marrow Cells and Spleen Cells in Mice
...Show More Authors

 

Genetic material is the most important component of cells because it contains the genetic information; hence any disruption to the structure chromosome of cells could lead to very bad results. Genotoxicity use to evaluate the safety of any chemical compounds on genetic materials. Artificial food flavoring additive are chemical substances to produce specific placebo effects added to foods but impart specific flavor to it.

The present study evaluates the genotoxic effect of artificial food flavoring additive on structure of chromosomes at three different concentrations (50%, 100%and 150%) on both bone marrow cells and spleen cells in mice for fourteen successive days. It was found that artificial food flavoring addit

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Investigation of the Natural Occurring Radioactive Material (NORM) in the cyprinus carpio fishes breeding in artificial lakes of Baghdad governorate
...Show More Authors

The steady consumption of fish led many researchers to study it preferences over other foods, especially for radioactivity content. The specific activity concentration (S.A) of natural occurring radioactive materials (NORM) have been measured for Cyprinus carpio fishes collected from several industrial fishes' lakes located in Baghdad governorate using gamma spectroscopy doped with high purity germanium coaxial detector (HPGe). Thirteen fishes' samples were collected from industrial lakes, three samples were collected from cages, and two samples were collected from Trigger River. The last two types of samples were collected in order to compare the results with it. The measured overall averages of S.A for Ra-226, Th-232, and K-40 were 58.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Ecological Engineering & Environmental Technology
Use of Nano Co-Ni-Mn Composite and Aluminum for Removal of Artificial Anionic Dye Congo Red by Combined System
...Show More Authors

The removal of congo red (CR) is a critical issue in contemporary textile industry wastewater treatment. The current study introduces a combined electrochemical process of electrocoagulation (EC) and electro-oxidation (EO) to address the elimination of this dye. Moreover, it discusses the formation of a triple composite of Co, Mn, and Ni oxides by depositing fixed salt ratios (1:1:1) of these oxides in an electrolysis cell at a constant current density of 25 mA/cm2. The deposition ended within 3 hours at room temperature. X-ray diffractometer (XRD), field emission scanning electron microscopy (FESEM), atomic force microscopy (AFM), and energy dispersive X-ray (EDX) characterized the structural and surface morphology of the multi-oxide sedim

... Show More
View Publication
Scopus (3)
Scopus Crossref