Preferred Language
Articles
/
bsj-6117
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signature samples collected from 200 individuals. This database is publicly distributed under the name of SIGMA for Malaysian individuals. The experimental results are reported as both error forms, namely False Accept Rate (FAR) and False Reject Rate (FRR), which achieved up to 4.15% and 1.65% respectively. The overall successful accuracy is up to 97.1%. A comparison is also made that the proposed methodology outperforms the state-of-the-art works that are using the same SIGMA database.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 07 2021
Journal Name
Pharmacy Practice
Measuring depression and anxiety prevalence among Iraqi healthcare college students using hospital anxiety and depression scale
...Show More Authors

Objective: The study aimed to 1) measure the prevalence of depression and anxiety among Iraqi pharmacy and medical students at a number of universities in Baghdad using Hospital Anxiety and Depression Scale (HADS) and 2) investigate the association between various sociodemographic factors and students’ HADS scores. Methods: This study was based on a cross-sectional descriptive design in four universities in Baghdad, Iraq. Depression and anxiety were screened using an Arabic version of the HADS. An online survey was administered via Qualtrics to convenience samples of students at four colleges of pharmacy and a college of medicine between March and June 2018. Multiple linear regression was used to identify factors associated

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Oct 22 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Classification of Different Shoulder Girdle Motions for Prosthesis Control Using a Time-Domain Feature Extraction Technique
...Show More Authors

Abstract—The upper limb amputation exerts a significant burden on the amputee, limiting their ability to perform everyday activities, and degrading their quality of life. Amputee patients’ quality of life can be improved if they have natural control over their prosthetic hands. Among the biological signals, most commonly used to predict upper limb motor intentions, surface electromyography (sEMG), and axial acceleration sensor signals are essential components of shoulder-level upper limb prosthetic hand control systems. In this work, a pattern recognition system is proposed to create a plan for categorizing high-level upper limb prostheses in seven various types of shoulder girdle motions. Thus, combining seven feature groups, w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Writing of a Bragg Grating on a D-shaped Optical Fiber Using the KrF Excimer Laser
...Show More Authors

Fiber Bragg Grating has many advantages where it can be used as a temperature sensor, pressure sensor or even as a refractive index sensor. Designing each of this fiber Bragg grating sensors should include some requirements. Fiber Bragg grating refractive index sensor is a very important application. In order to increase the sensing ability of fiber Bragg gratings, many methods were followed. In our proposed work, the fiber Bragg grating was written in a D-shaped optical fiber by using a phase mask method with KrFexcimer. The resultant fiber Bragg grating has a high reflectivity 99.99% with a Bragg wavelength of 1551.2 nm as a best result obtained from a phase mask with a grating period of 1057 nm. In this work it was found that the rota

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Energy
Solidification enhancement in a triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (185)
Crossref (181)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Optimal Location of Static Synchronous Compensator (STATCOM) for IEEE 5-Bus Standard System Using Genetic Algorithm
...Show More Authors

Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis and evaluation of B-cyclodextrin Based Nanosponges of 5- Fluorouracil by Using Ultrasound Assisted Method
...Show More Authors

 

CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.

5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM an

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (11)
Scopus Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Energy Consumption Analyzing in Single hop Transmission and Multi-hop Transmission for using Wireless Sensor Networks
...Show More Authors

Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Permeability of Radicular Dentine after Using Different Irrigant Activation Techniques Including Photo Induce Photoacoustic Streaming Technique
...Show More Authors

Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs)  on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (32)
Crossref (18)
Scopus Crossref