Preferred Language
Articles
/
jih-546
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resultant average accuracies of the iris technique and voice technique are 99.83% and 98%, respectively. Thus, the iris recognition technique provides higher accuracy and security than the voice recognition technique

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
An Investigation of Iraqi Fourth-Year University Students’ Recognition of Presupposition Through The Linguistic Triggers
...Show More Authors

Presupposition is the background belief that is known by both the speaker and the addressee, it is tied to particular words and aspects of the surface structure that act as linguistic triggers. The present study aims at investigating whether Iraqi fourth -year university students are able to recognize the English presuppositions through the meaning of these linguistic triggers .To fulfil the basic requirements of the study, the researcher has conducted a test . The results of the study have validated the hypothesis of the work and it is found that the linguistic triggers are important tools in recognizing presuppositions.    

View Publication Preview PDF
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Iris Outer Boundary Localization Based on Leading Edge Technique
...Show More Authors

In recent years, the iris biometric occupies a wide interesting when talking about
biometric based systems, because it is one of the most accurate biometrics to prove
users identities, thus it is providing high security for concerned systems. This
research article is showing up an efficient method to detect the outer boundary of
the iris, using a new form of leading edge detection technique. This technique is
very useful to isolate two regions that have convergent intensity levels in gray scale
images, which represents the main issue of iris isolation, because it is difficult to
find the border that can separate between the lighter gray background (sclera) and
light gray foreground (iris texture). The proposed met

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Intelligent EMG Pattern Recognition Control Method for Upper-Limb Multifunctional Prostheses: Advances, Current Challenges, and Future Prospects
...Show More Authors

View Publication
Scopus (124)
Crossref (121)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Multiple Voice narrative
...Show More Authors

With the shift of narration and the revolution against the traditional methods which were dominated by the authorial intrusion and the single narrative voice, there appeared new forms that go along with the change in methods of narration. Form becomes the representation which equips us to understand more fully aspects of existence outside of art. Form is the objectifying of idea, and its excellence depends upon its appropriateness to the idea.1 One of the most important approaches to writing fiction is the power of point of view.

In the strategy of 'point of view' lies the secret of art and, as Norman Friedman indicates, it provides a method for distinguishing the possible degrees of authorial extinction in the narrati

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
Iris Identification Based on the Fusion of Multiple Methods
...Show More Authors

Iris recognition occupies an important rank among the biometric types of approaches as a result of its accuracy and efficiency. The aim of this paper is to suggest a developed system for iris identification based on the fusion of scale invariant feature transforms (SIFT) along with local binary patterns of features extraction. Several steps have been applied. Firstly, any image type was converted to  grayscale. Secondly, localization of the iris was achieved using circular Hough transform. Thirdly, the normalization to convert the polar value to Cartesian using Daugman’s rubber sheet models, followed by histogram equalization to enhance the iris region. Finally, the features were extracted by utilizing the scale invariant feature

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation the Procedure for Recognition of Income Tax to Reduce Tax Evasion: بحث تطبيقي في الهيئة العامة للضرائب
...Show More Authors

  Tax state institution regards as one of the largest state institutions implementing the tax rules issuing be legislative body and achieving the goals of tax (financial, economic, social and political). So, the tax management should pay attention to the procedures enabling it to achieve those rules starting from the procedures of tax restrict and ending by tax allocation where the process of assessment the taxation must relaxing on modern methods. The problem of the study raising from that in spite of there is a low  obliging the taxable person (registered or not) to submit a declaration about his income and the achieved profit to be the base of taxation˒ where the other ways  are secondary ways helping in rejection of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Carbonate Ramp Facies and Porosity Recognition: Case Study of the Late Albian-Early Cenomanian Mauddud Formation in Ratawi Oilfield, Southern Iraq
...Show More Authors

     The carbonate ramp facies of the Late Albian-Early Cenomanian Mauddud Formation were studied in the Ratawi Oilfield, Basra Governorate, south of Iraq using integrated borehole data set that included, core and cutting samples in three drilled wells to analyze the petrography of the Mauddud Formation, two hundred and eighty-one (281) thin sections were prepared and examined for the three selected wells. The results show that the formation is composed of light grey dolomitized limestone and pseudo-oolitic creamy limestone with green to bluish shale. The petrographic observations results show four facies’ associations in the Mauddud Formation. These include:  Mid–Ramp environment which is represented by Argillaceous mudstone mi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref