Preferred Language
Articles
/
bsj-3862
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision with moving capsules is implemented to achieve realistic behavior cloth modelled on animated characters. This is to enable comparable incompressibility and convergence to raised cosine deformation (RCD) function solvers. On implementation, this research achieves optimized collision between clothes, syncing of the animation with the cloth simulation and setting the properties of the cloth to get the best results possible. Therefore, a real-time cloth simulation, with believable output, on animated VHC is achieved. This research perceives our proposed method can serve as a completion to the game assets clothing pipeline.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Studying the effect of temperature and treating time on some physical properties of carbon black
...Show More Authors

Samples prepared by using carbon black as a filler material and phenolic resin as a binder. The samples were pressed in a (3) cm diameter cylindrical die to (250)MPa and treated thermally within temperature range of (600-1000)oC for two and three hours. Physical properties tests were performed, like density, porosity, and X-ray tests. Moreover vicker microhardness and electric resistivity tests were done. From the results, it can be concluded that density was increased while porosity was decreased gradually with increasing temperature and treating time. In microhardness test, it found that more temperature and treating time cause more hardness. Finally the resistivity was decreased in steps with temperature and treating time. It can be c

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 24 2024
Journal Name
Mathematics
Identification of Time-Wise Thermal Diffusivity, Advection Velocity on the Free-Boundary Inverse Coefficient Problem
...Show More Authors

This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Effect of Lanthanum Addition on the Microstructure of Mg-4Al Alloy
...Show More Authors

 This research was to determine the effect of rare earth metal (REM) on the as-cast microstructure of Mg-4Al alloy. The rare earth metal used here is Lanthanum to produce Mg-4Al-1.5La alloy. The microstructure was characterized by optical microscopy. The phases of this alloy were identified by X-ray diffraction. The microstructure of Mg-4Al consists of α-Mg and grain boundaries with precipitated phase particles. With the addition of Lanthanum, three distinct phases were identified in the X-ray diffraction patterns of the as cast Mg-4Al-1.5La:  Mg, Al11La3, Al4La. The Mg17Al12 phase was not detected. The addition of Lanthanium increases the hardness and dec

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Indicative supervision on the monetary business organizations (Banks) Case study: Iraq
...Show More Authors

Indicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.

The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.

This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.

Iraqi banks suffered from high levels of direct co

... Show More
View Publication
Crossref