Preferred Language
Articles
/
yxZGpYsBVTCNdQwCgtWK
User authentication system based specified brain waves

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.

Scopus
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Brain Tumor Detection Method Using Unsupervised Classification Technique

Magnetic  Resonance  Imaging  (MRI)  is  one  of  the  most important diagnostic tool. There are many methods to segment the

tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment   the   brain   with   high   precision.   In   this   project,   the unsupervised  classification methods have been used in order to detect the tumor  disease from MRI images.    These metho

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2009
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A study of 74 cases of brain Abscess

Background: Brain abscess is collection of pus in the brain parrynchima surrounded by a true capsule. Usually diagnosed by CT & MRI, & treated surgically by drainage by burr hole, or excision.
Objective: evaluate our work with brain abscess.
Patient& method: 74 Patients collected in the specialized surgical hospital neuro-surgical department, from Jan. 1995 till Jan. 2005 treated surgically, all cases fully evaluated clinically & radiologically & then evaluation of the surgical procedure.
Results: there is a slight male predominance & prevalence more in the 1st 2decades of life mostly in children with cong. heart disease, headache was the most common presenting feature, with other signs of infection diagn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology

View Publication
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System

View Publication
Scopus (1)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Oct 31 2022
Journal Name
Ingénierie Des Systèmes D Information
Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform

Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
An Accurate Handwritten Digits Recognition system Based on DWT and FCT

In this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
National Grid Connected 3-Phase Inverter based on Photovoltaic Solar System

In this paper, a national grid-connected photovoltaic (PV) system is proposed. It extracts the maximum power point (MPP) using three-incremental-steps perturb and observe (TISP&O) maximum power point tracking (MPPT) method. It improves the classic P&O by using three incremental duty ratio (ΔD) instead of a single one in the conventional P and O MPPT method. Therefore, the system's performance is improved to a higher speed and less power fluctuation around the MPP. The Boost converter controls the MPPT and then is connected to a three-phase voltage source inverter (VSI). This type of inverter needs a high and constant input voltage. A second-order low pass (LC) filter is connected to the output of VSI to reduce t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref