Preferred Language
Articles
/
dhds7pEBVTCNdQwCh5zh
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Numerical Investigation of Transient Heat Conduction through a Thermal Insulation of Temperature Dependant Thermal Properties
...Show More Authors

The two-dimensional transient heat conduction through a thermal insulation of temperature dependent thermal properties is investigated numerically using the FVM. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner surface with a step change in temperature and subjected at its outer surface with a natural convection boundary condition associated with a periodic change in ambient temperature and heat flux of solar radiation. Two thermal insulation materials were selected. The fully implicit time scheme is selected to represent the time discretization. The arithmetic mean thermal conductivity is chosen to be the value of the approximated thermal conductivity at the i

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
2nd International Conference On Materials Engineering & Science (iconmeas 2019)
Modeling of adsorption isotherms of oil content through the electrocoagulation treatment of real oily wastewater
...Show More Authors

View Publication Preview PDF
Scopus (30)
Crossref (25)
Scopus Crossref
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
The Dynamic Behavior of Water Flowing Through Packed Bed of Different Particle Shapes and Sizes
...Show More Authors

An experimental study was conducted on pressure drop of water flow through vertical cylindrical packed beds in turbulent region and the influence of the operating parameters on its behavior. The bed packing was made of spherical and non-spherical particles (spheres, Rasching rings and intalox saddle) with aspect ratio range 3.46  D/dp  8.486 obtaining bed porosities 0.396 0.84 and Reynolds number 1217  21758. The system is consisted of 5 cm inside diameter Perspex column, 50 cm long; distilled water was pumped through the bed with flow rate 875, 1000, 1125, 1250,1375 and 1500 l/h and inlet water temperature 20, 30, 40 and 50 ˚C. The packed bed system was monitored by using LabVIEW program, were the result

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Upgrading of Al-Rustamiyah Sewage Treatment Plant Through Experimental and Theoretical Analysis of Membrane Fouling
...Show More Authors

Al-Rustamiyah plant is the oldest and biggest sewage treatment plant in Iraq; it locates in the south of Baghdad city. The plant suffers from serious problems associated with overflow and low capacity. The present work aims to upgrade the heart of biological treatment process through suggesting the use of membrane bioreactor; (MBR). In this work, fouling of membrane during sewage treatment has been analyzed experimentally and theoretically by fouling mechanisms. Aeration has been applied in order to control fouling through producing effective diameters of air bubbles close to the membrane walls. Effect of air flow rate on flux decline was investigated. Hermia's models were used to investigate the fouling mechanisms. The results showed th

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Tetracycline removal from aqueous solution through photo-anodic oxidation process using rotating graphite cylinder anode
...Show More Authors

   In the present work, tetracycline (TC) was removed from a simulated wastewater through a new photo-anodic oxidation process with a rotating graphite cylinder anode. The effects of current density, pH, rotation speed, and NaCl addition were evaluated. The results confirmed that increasing the current density results in improving the removal of TC. However, increasing the current density beyond 5 mA/cm2 had little effect on TC removal. Results revealed that TC removal using photoanodic oxidation can be achieved at high performance with an initial pH of 5. Increasing or decreasing pH beyond this value has a negative effect on TC removal. Increasing rotation speed gave better performance for TC removal due to the increase in mass t

... Show More
View Publication
Crossref
Publication Date
Thu Feb 29 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
LOW-‎COST SOIL ‎MOISTURE SENSORS’ ASSESSMENT FOR THEIR ACCURACY AFTER CALIBRATION THROUGH THE ‎GRAVIMETRIC METHOD
...Show More Authors

The existing study aimed to assess four soil moisture sensors’ capacitive (WH51 and SKU: S EN0193) and resistive (Yl69 and IC Station) abilities, which are affordable and medium-priced for their accuracy in six common soil types in the central region of Iraq. The readings’ calibration for the soil moisture sensor devices continued through two gravimetric methods. The first depended on the protocols’ database, while the second was the traditional calibration method. The second method recorded the lowest analysis error compared with the first. The moderate-cost sensor WH51 showed the lowest standard error (SE), MAD , and RMSE and the highest R² in both methods. The performance accuracy of WH51 was close to readings shown by the manufac

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Potential and Current Distribution in Flow Through Porous Electrochemical Reactor Working under Limiting Current Conditions
...Show More Authors

View Publication Preview PDF