Preferred Language
Articles
/
yxZGpYsBVTCNdQwCgtWK
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.

Scopus
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Cognitive Implications of Usage-Based Approach: رغد فهمي اعجمي
...Show More Authors

Tremendous efforts have been exerted to understand first language acquisition to facilitate second language learning. The problem lies in the difficulty of mastering English language and adapting a theory that helps in overcoming the difficulties facing students. This study aims to apply Thomasello's theory of language mastery through usage. It assumes that adults can learn faster than children and can learn the language separately, and far from academic education. Tomasello (2003) studied the stages of language acquisition for children, and developed his theory accordingly. Some studies, such as: (Ghalebi and Sadighi, 2015, Arvidsson, 2019; Munoz, 2019; Verspoor and Hong, 2013) used this theory when examining language acquisition. Thus,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Polymer electrolytes based PAN for dye-sensitized solar cells
...Show More Authors

Solar cells has been assembly with electrolytes including I−/I−3 redox duality employ polyacrylonitrile (PAN), ethylene carbonate (EC), propylene carbonate (PC), with double iodide salts of tetrabutylammonium iodide (TBAI) and Lithium iodide (LiI) and iodine (I2) were thoughtful for enhancing the efficiency of the solar cells. The rendering of the solar cells has been examining by alteration the weight ratio of the salts in the electrolyte. The solar cell with electrolyte comprises (60% wt. TBAI/40% wt. LiI (+I2)) display elevated efficiency of 5.189% under 1000 W/m2 light intensity. While the solar cell with electrolyte comprises (60% wt. LiI/40% wt. TBAI (+I2)) display a lower efficiency of 3.189%. The conductivity raises with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
3D scenes semantic segmentation using deep learning based Survey
...Show More Authors
Abstract<p>Semantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPROVED IMAGE COMPRESSION BASED WAVELET TRANSFORM AND THRESHOLD ENTROPY
...Show More Authors

In this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref