Preferred Language
Articles
/
lRfpS5IBVTCNdQwCWqqe
Prototyping of Multi-Factors Based Vehicle Accident Detection and Reporting System Relying on GPS and GSM
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Physics: Conference Series
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and cubic SVM
...Show More Authors
Abstract<p>Communication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting IPSASs and its impact on the quality of financial reporting and performance evaluation in Iraqi government units
...Show More Authors

Abstract

     Performance evaluation is of great importance in all countries of the world, because it has a prominent and effective role in determining the efficiency and effectiveness of the optimal use of available resources, which are rare and important in achieving the desired objectives. With the continued growth of public spending and the limited resources, the State seeks to achieve its objectives through its units with minimal expenditure or deficit, rationality and wastefulness in the spending. In many countries, particularly developing countries, reforms are made in the public sector to achieve that goal through the adoption of IPSAS, which is reflected in the developmen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Dual-Stage Social Friend Recommendation System Based on User Interests
...Show More Authors

The use of online social network (OSN) has become essential to humans' lives whether for entertainment, business or shopping. This increasing use of OSN motivates designing and implementing special systems that use OSN users' data to provide better user experience using machine learning and data mining algorithms and techniques. One system that is used extensively for this purpose is friend recommendation system (FRS) in which it recommends users to other users in professional or entertaining online social networks.

For this purpose, this study proposes a novel friend recommendation system, namely Hybrid Friend Recommendation (FR) model. The Hybrid model applies dual-stage methodology on unlabeled data of 1241 users collected fro

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Robotic System for Tracking Moving Objects Based On Their Color
...Show More Authors

Tracking moving objects is one of a very important applications within the computer vision. The goal of object tracking is segmenting a region of interest from a video scene and keeping track of its motion and positioning. Track moving objects used in many applications such as video surveillance, robot vision, and traffic monitoring, and animation. In this paper a four-wheeled robotic system have been designed and implemented by using Arduino-Uno microcontroller. Also a useful algorithms have been developed to detect and track objects in real time. The main proposed algorithm based on the kernel based color algorithm and some geometric properties to tracking color object. Robotic system is a compromise of two principal parts which are th

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 03 2022
Journal Name
International Journal Of Health Sciences
Using Elisa and nested PCR for detection of the toxoplasmosis in milk and the influence of infection and some factors on milk composition in the Iraqi local and Shami goats
...Show More Authors

This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected

... Show More
View Publication
Crossref