Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (23)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Intellectual property rights and its implications for the pharmaceutical industry in Iraq under accession to the World Trade Organization
...Show More Authors

The main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licenses from

... Show More
Crossref
Publication Date
Thu Jan 06 2022
Journal Name
International Journal Of Research In Social Sciences And Humanities
Intellectual property rights and its implications for the pharmaceutical industry in Iraq under accession to the World Trade Organization
...Show More Authors

The main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licens

... Show More
View Publication
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Iraqi Journal Of Laser
Thermal Effects of 940 nm Diode Laser on Dental Socket Blood after Teeth Extraction for Diabetic Patients
...Show More Authors

Abstract: Background: High percentage of diabetes patients complain from post extraction hemorrhage. Many types of hemostatic materials are used to stop bleeding after teeth extraction: diode lasers are good hemostatic agents owing to their highly absorption by hemoglobin therefore they are used in soft tissue procedures with relatively no effects on dental hard tissues due to their poorly absorption by water and hydroxyapatite. Objectives: The aim of this study is to evaluate the efficiency of diode laser to assist the clot formation after tooth extraction for type II diabetes patients with minimum temperature elevation to prevent periodontal destruction. Materials and methods: From 12 type II diabetes patients (7 males and 5 females wi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of prophylactic Dexamethasone on postoperative swelling and trismus following impacted mandibular third molar surgical extraction
...Show More Authors

Background: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref