Preferred Language
Articles
/
mhcUOI8BVTCNdQwCW2NF
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors

Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
Coming of Age in Times of Epidemics: Laurie Halse Anderson’s ‎Fever 1793‎
...Show More Authors

The frenzy caused by the horrific news on the TVs and the social media about COVID19 brings to the forefront the catastrophic epidemics in the past that led to mass deaths and haunt the imagination of historians and public alike. Works of fiction often depict the disastrous consequences of these epidemics, both real and imagined, focusing on the gothic experience the characters endure and their struggle to survive the disasters. This article explores this major issue in a contemporary novel, Laurie Halse Anderson’s Fever 1793 (2000). It chronicles the journey of the female protagonist and her struggle to survive and achieve autonomy during the historical yellow fever that hit Philadelphia more than two centuries ago, which stuck to the me

... Show More
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte
THE IMPACT OF ENGINEERING ANXIETY ON STUDENTS: A COMPREHENSIVE STUDY IN THE FIELDS OF SPORT, ECONOMICS, AND TEACHING METHODS
...Show More Authors

Scopus (24)
Scopus
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
The age-specific fecundity life tables of Planococcus citri Risso and important predators attack in Baghdad
...Show More Authors

Reproduction potential and age –specific fecundity of the Mealybug Planococcus citri Risso were studied in the laboratories of Biological control research unit,college of Agriculture –Baghdad university at 25± 2Cº and 60-70% R.H.with 16 light:8 dark photo period.The results showed that the survival ratio began to decline at the 38th day, the average female age was 20 days ,while the average age was 8 days at the first reproduction . Net reproduction rate ( Ro ) was 58.59 female female generation which prove that the population of the mealybug was of the unstable kind , intrinsic rate of increase (rm) was 0.118 femalefemale and the average length period of generation ( T ) was 34.30 days . Many local predators attack the mealybug

... Show More
View Publication Preview PDF
Crossref