Preferred Language
Articles
/
mxell5ABVTCNdQwCrY6F
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual information (MI), along with analysis of variance (ANOVA) for feature selection. Two iris classification systems were developed: one using LDA as an input for the OneR machine learning algorithm and another innovative hybrid model based on a One Dimensional Convolutional Neural Network (HM-1DCNN). The MMU database was employed, achieving a performance measure of 94.387% accuracy for the OneR model. Additionally, the HM-1DCNN model achieved 99.9% accuracy by integrating LDA with MI and ANOVA. Comparisons with previous studies show that the HM-1DCNN model performs exceptionally well, with at least 1.69% higher accuracy and lower processing time.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of coordination and joint cooperation in raising the quality of auditing in accordance with the INTOSAI standard(9150 (: Applied research in the General Company for Marketing Medicines and Medical Appliances - Kimadia
...Show More Authors

The process of coordination and joint cooperation between SAIs and internal auditors in the public sector is considered one of the very important matters in performing efficient audits and are of high quality, especially if this coordination and cooperation is implemented in accordance with international standards, as it leads to avoiding duplication in auditing work. And the distribution of work in a distribution that achieves the objectives of auditing in general and is of general benefit to the economic unit.

The research problem lies in the weakness of the relationship between internal auditing and external auditing as a result of not applying INTOSAI Standard (9150) coordination and joint cooperation

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The compatibility of the Development Fund for Iraq to the requirements of sovereign wealth funds An analytical study of the legal framework and institutional structure in accordance with the standards of the Santiago
...Show More Authors

Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
On Skew Left n-Derivations with Lie Ideal Structure
...Show More Authors

In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and  the commutativity of Lie ideal under certain conditions were proved.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi Postgraduate Medical Journal
Angiolymphoid hyperplasia with eosinophilia (pseudopyogenic granuloma) among Iraqi patients
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1

View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
numbers of PFCanti-HBc in patients with chronic Hepatitis
...Show More Authors

plaque forming assay was used enumerate the number of plaque forming cells of anti-HBc in eight patintes with chronic hepatitis and eight health

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Engineering
Analysis of Concrete Flexural Members Reinforced with Fibre Polymer
...Show More Authors

Publication Date
Sun Oct 01 2017
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Measuring of Plasma Melatonin Level in Patients with Preeclampsia
...Show More Authors

Background: disturbed physiological rhythm of blood pressure in preeclampsia is a common finding. The role of oxidative stress in pathogenesis of preeclampsia is well accepted. Melatonin is a powerful free radical scavenger so it's rapidly consumed by enhanced reactive oxygen species in preeclampsia causing non-dipping in blood pressure.Objective: To evaluate the change in plasma melatonin levels in patients with preeclampsia and its relationship with blood pressure.Patients and methods: In this prospective case control study a total of 40 primigravidae pregnant women were recruited during the period of 11 months between August 2015 and August 2016 in Baghdad teaching hospital, medical city, Iraq, divided into two groups:First group

... Show More
View Publication
Crossref (1)
Crossref