Preferred Language
Articles
/
dhds7pEBVTCNdQwCh5zh
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
The Journal Of Immunology
Extracellular Histones Inhibit Complement Activation through Interacting with Complement Component 4
...Show More Authors
Abstract<p>Complement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin</p> ... Show More
View Publication
Scopus (22)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
Assessment of Pedestrian Walking Speed Through the Religious Occasions in Iraq
...Show More Authors

The design of safe pedestrian facilities usually depends on the assessment of pedestrian characteristics and behavior. In this investigation, pedestrian walking speed through the religious occasion have been monitored at three locations, Al- Kadhimiya (Imam AL-Kadim), Najaf and Karbala (Imam AL-Husain) holy shrines. Video captures of the pedestrian through their walking to the two holy shrines have been prepared and analyzed for walking speed, gender, age groups, and clothing tradition. The pedestrian sample size is 468, 501, and 447 for Al- Kadhimiya, Karbala, and Najaf respectively. When the gender is taken into consideration, it can be noted that the walking speed of male and female pedestrian is (0.97, 1.68, and 1.63

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Environmental benefits through Storage, Exchange of thermal energy in smart city
...Show More Authors

The aim of this study is to look at  the potential of a  local sustainable energy network in  a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage   andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from  transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 07 2020
Journal Name
The International Journal Of Artificial Organs
Improved hand prostheses control for transradial amputees based on hybrid of voice recognition and electromyography
...Show More Authors

The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voic

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Performance Enhancement of Face Recognition under High-Density Noise Using PCA and De-Noising Technique
...Show More Authors

       There are many techniques for face recognition which compare the desired face image with a set of faces images stored in a database. Most of these techniques fail if faces images are exposed to high-density noise. Therefore, it is necessary to find a robust method to recognize the corrupted face image with a high density noise. In this work, face recognition algorithm was suggested by using the combination of de-noising filter and PCA. Many studies have shown that PCA has ability to solve the problem of noisy images and dimensionality reduction. However, in cases where faces images are exposed to high noise, the work of PCA in removing noise is useless, therefore adding a strong filter will help to im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref