Preferred Language
Articles
/
ohfox5EBVTCNdQwCuJqP
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Improving Pre-trained CNN-LSTM Models for Image Captioning with Hyper-Parameter Optimization
...Show More Authors

The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Effect of an exercise program on physical-kinetic intelligence and the skills of dribbling and shooting in basketball among female students
...Show More Authors

The current research aimed to study the effect of an exercise program on physical-kinetic intelligence and the skills of dribbling and shooting in basketball among female students. The research community was composed of 102 female students in the second stage of the Physical Education and Sports Sciences College for Girls of Baghdad University, in the academic year 2021-2022. A total of 40 female students were the sample of the study: 20 female students in the control group and 20 female students in the experimental group. After the implementation of the exercise program, there were significant improvements from pre-tests to post tests in the two groups (control and experimental groups), in physical-kinetic intelligenc

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the marketing intelligence system in the quality of the insurance service : Applied research in the National Insurance Company
...Show More Authors

The current research seeks to identify the role of the marketing intelligence system in its dimensions (customer intelligence, market intelligence, competitor intelligence, insurance product intelligence, sales representatives) and its reflection on improving the quality of the insurance service provided by the National Insurance Company represented in its dimensions (reliability, response, tangibility, Safety, the spirit of empathy, communication) adopted in the current research, and based on that, the research came as an attempt to find out the extent to which the research sample company can apply the approach of the marketing intelligence system and its impact on improving the quality of the insurance service provided to custo

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Effect of Laser Surface Modification on the Corrosion Resistance of Dental Alloys in Artificial Saliva Containing Alcoholic Beverages
...Show More Authors

The objective of this study is to demonstrate the corrosion behavior of dental alloys Co-Cr-Mo, Ni-Cr-Mo and Ti-Al-V in artificial saliva at pH=4 and 37oC enriched with ethyl alcohol at 8% percentage. The linear and cyclic polarizations were investigated by electrochemical measurements. Laser surface modification was achieved for the three dental alloys to improve corrosion resistance. The results show that corrosion resistance of Co-Cr-Mo and Ni-Cr-Mo alloys only were increased after laser treatment due to the fact that laser radiation has caused a smoother surface, in addition to the decrement in corrosion current densities (icorr) for Co-Cr-Mo and Ni-Cr-Mo alloys and the reverse scan in cyclic polarization became in the wider range of

... Show More
View Publication Preview PDF
Publication Date
Sat May 10 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The surface roughness of new fluoride releasing material after using three polishing protocols and storage in artificial saliva
...Show More Authors

Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 04 2023
Journal Name
Environmental Progress & Sustainable Energy
Removal of <scp>E133</scp> brilliant blue dye from artificial wastewater by electrocoagulation using cans waste as electrodes
...Show More Authors
Abstract<p>Solid‐waste management, particularly of aluminum (Al), is a challenge that is being confronted around the world. Therefore, it is valuable to explore methods that can minimize the exploitation of natural assets, such as recycling. In this study, using hazardous Al waste as the main electrodes in the electrocoagulation (EC) process for dye removal from wastewater was discussed. The EC process is considered to be one of the most efficient, promising, and cost‐effective ways of handling various toxic effluents. The effect of current density (10, 20, and 30 mA/cm<sup>2</sup>), electrolyte concentration (1 and 2 g/L), and initial concentration of Brilliant Blue dye (15 and 30 mg/L) on </p> ... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF