Preferred Language
Articles
/
mxell5ABVTCNdQwCrY6F
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual information (MI), along with analysis of variance (ANOVA) for feature selection. Two iris classification systems were developed: one using LDA as an input for the OneR machine learning algorithm and another innovative hybrid model based on a One Dimensional Convolutional Neural Network (HM-1DCNN). The MMU database was employed, achieving a performance measure of 94.387% accuracy for the OneR model. Additionally, the HM-1DCNN model achieved 99.9% accuracy by integrating LDA with MI and ANOVA. Comparisons with previous studies show that the HM-1DCNN model performs exceptionally well, with at least 1.69% higher accuracy and lower processing time.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Strategic Intelligence and Its Relation to Fifth Preparatory Students’ Achievement in Mathematics
...Show More Authors

The research seeks to identify the correlation relationship between strategic intelligence and fifth preparatory students’ achievement in mathematics. To achieve this objective, stratified random sampling were used based on participants’ gender and the branch of study. The sample consisted of (200) male and female fifth preparatory students for both (literary and scientific branch) who were displaced to Arbil city in Iraq for the academic year 2016-2017. As for research tool, the researcher administered strategic intelligence test to the study sample in the second semester which was designed by Ibrahim (2017), it includes (30) items divided into five domains (predictability, organized thinking, future view, motivation, and pa

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Attitudes of Teachers of Art Education towards the Use of Visual Intelligence in Teaching: تحرير جاسم كاطع
...Show More Authors

     The scientific and technological developments and their practical applications in all fields of life in general and in the education field in specific have led to the emergence of variables in the educational structure, teaching methods and in education in their modern form which is consistent in its entirety with    the spirit of the age. We today live the age of knowledge increase full of wide ranging scientific and technological developments. Thus life demands human capabilities of a special kind able to develop and innovate. Here the increasing significance emerges for taking care of the human powers through educational systems much different from those current traditional systems.  System

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Kernel estimation of returns of retirement funds of employers based on monetary earnings (subscriptions and compensation) via regression discontinuity in Iraq
...Show More Authors

Regression Discontinuity (RD) means a study that exposes a definite group to the effect of a treatment. The uniqueness of this design lies in classifying the study population into two groups based on a specific threshold limit or regression point, and this point is determined in advance according to the terms of the study and its requirements. Thus , thinking was focused on finding a solution to the issue of workers retirement and trying to propose a scenario to attract the idea of granting an end-of-service reward to fill the gap ( discontinuity point) if it had not been granted. The regression discontinuity method has been used to study and to estimate the effect of the end -service reward on the cutoff of insured workers as well as t

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 03 2025
Journal Name
Lecture Notes In Networks And Systems
The Role of Social Media Sites Supported by Artificial Intelligence Tools in Spreading and Promoting the Civilizations Dialogues
...Show More Authors

Mixing this strategy with a qualitative research design and an idea known as AI-supported journalism, the paper is going to approach the requirements of how AI technologies may transform journalism content and culture in a way beyond what one anticipates; therefore, enabling more of it to reach an audience. The current research used descriptive research design to investigate the potential applications of the AI tools that mediate civilizational conversation and a structured questionnaire to media professionals. AI-driven journalism can promote peaceful cohabitation and mutual respect and thus act as a bridge between cultures, the research said. The piece even goes on to mention the need for media establishments and civil soc

... Show More
Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Photos of Women in Iraqi Feature Films after 2003
...Show More Authors

The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Examining sensitivity of financial performance at construction projects prequalification stage
...Show More Authors

Construction projects are complicated in nature and require many considerations in contractor selection. One of the complicated interactions is that between performance with the project size, and contractor financial status, and size of projects contracted. At the prequalification stage, the financial ‎requirements restrict the ‎contractors to meet minimum limits in financial criteria such as net worth, working capital and ‎annual turnover, etc. In construction projects, however, there are cases when contractors meet these requirements but show low performance in practice. The model used in the study predicts the performance by training of a neural network. The data used in the study are 72 of the most recent roadw

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus