Preferred Language
Articles
/
dhds7pEBVTCNdQwCh5zh
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Comparison of Faster R-CNN and YOLOv5 for Overlapping Objects Recognition
...Show More Authors

Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area.  The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
CUSTOM ANALYSIS THROUGH Nth ORDER GAUSSIAN NOISE
...Show More Authors

Scopus
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
COMMUNICATION SKILLS THROUGH THE LANGUAGE OF SPEECH
...Show More Authors

Language is the realistic and sensitive basis for any communication between two or more parties. It is an important workshop that prepares meanings and coding them according to a linguistic structure governed by agreed rules that speak to and coexist with everyone.

Whereas the forms of communication are: personal, mediator and mass, none of them can move away from language in their dealings and communication patterns. Since each has its own characteristics and skills, it must be launched in its fields through verbal and non-verbal symbols and wears the elements of influential language as intended.

It makes the recipient face two things: whether he fails to understand those symbols hence its purpose fail, or he meditates s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 03 2025
Journal Name
Retos: Nuevas Tendencias En Educación Física, Deporte Y Recreación, Issn-e 1988-2041, Issn 1579-1726, Nº. 63, 2025, Págs. 979-989
The effects of the integrative strategy on fostering reflective thinking and imparting basic basketball offensive techniques to female students
...Show More Authors

Autorías: Nadeema Badr Mohammed, Missaa Nadem, Huda Badwe Shbeeb, Iqbal Abdul Hussein Neamah, Najlaa Abbas AL Zuhairi, Nihad Mohammed Alwan. Localización: Retos: nuevas tendencias en educación física, deporte y recreación. Nº. 63, 2025. Artículo de Revista en Dialnet.

View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 30 2025
Journal Name
Retos
The effects of the integrative strategy on fostering reflective thinking and imparting basic basketball offensive techniques to female students
...Show More Authors

Objective: The objective of this study is to develop instructional materials that teach fundamental basketball skills to female students enrolled in the first year of the College of Physical Education and Sports Sciences for Girls at the University of Baghdad while also encouraging reflective thinking (RT). Research methodology: the researcher chose the experimental methodology with the two equal group's method. Finding the community and choosing the right sample for the study's kind and goals are essential to the accomplishment of any research project. A sample for the primary experiment was picked at random after the researcher confirmed the students' first-year basketball curriculum. This study community consisted of (40) fourth-

... Show More
View Publication
Scopus Crossref