Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in an image, possesses the unique characteristic that no two individuals share the same ear patterns. Consequently, our research proposes a system for individual identification based on ear traits, comprising three main stages: (1) pre-processing to extract the ear pattern (region of interest) from input images, (2) feature extraction, and (3) classification. Convolutional Neural Network (CNN) is employed for the feature extraction and classification tasks. The system remains invariant to scaling, brightness, and rotation. Experimental results demonstrate that the proposed system achieved an accuracy of 99.86% for all datasets.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreThe synchronization of a complex network with optoelectronic feedback has been introduced theoretically, with use of 2×2 oscillators network; each oscillator considered is an optocoupler (LED coupled with photo-detector). Fixing the bias current (δ) and increasing the feedback strength (Ԑ) of each oscillator, the dynamical sequence like chaotic and periodic mixed mode oscillations has been observed. Synchronization of unidirectionally coupled of light emitting diodes network has been featured when coupling strength equal to 1.7×10-4. The transition between non-synchronization and synchronization states by means of the spatio-temporal distribution has been investigated.
The research focuses on determination of best location of high elevated tank using the required head of pump as a measure for this purpose. Five types of network were used to find the effect of the variation in the discharge and the node elevation on the best location. The most weakness point was determined for each network. Preliminary tank locations were chosen for test along the primary pipe with same interval distance. For each location, the water elevation in tank and pump head was calculated at each hour depending on the pump head that required to achieve the minimum pressure at the most weakness point. Then, the sum of pump heads through the day was determined. The results proved that there is a most economical lo
... Show MoreWater is an essential aspect of life and important in evolution. Recently the potable water quality topic has received much attention. The study aims to determine drinking water quality in Al-Najaf City by collecting samples throughout Al-Najaf city and comparing the results with the Iraqi guidelines (IQS 417) and World Health Organization (WHO) guidelines, as well as to calculate the WQI. Samples were tested in the laboratory between December 2021 and June 2022. The results showed that multiple parameters exceeded the allowable limits during both testing periods; during winter months, the results of TDS and turbidity exceeded the upper limits in multiple locations. Total hardness values also
... Show MoreCollapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com
... Show MoreMultiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.
Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care
Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More