Preferred Language
Articles
/
ohfox5EBVTCNdQwCuJqP
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep learning model was utilized to resize images and feature extraction. Finally, different ML classifiers have been tested for recognition based on the extracted features. The effectiveness of each classifier was assessed using various performance metrics. The results show that the proposed system works well, and all the methods achieved good results; however, the best results obtained were for the Support Vector Machine (SVM) with a linear kernel.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 09 2023
Journal Name
Coatings
Nondestructive Evaluation of Fiber-Reinforced Polymer Using Microwave Techniques: A Review
...Show More Authors

Carbon-fiber-reinforced polymer (CFRP) is widely acknowledged as a leading advanced material structure, offering superior properties compared to traditional materials, and has found diverse applications in several industrial sectors, such as that of automobiles, aircrafts, and power plants. However, the production of CFRP composites is prone to fabrication problems, leading to structural defects arising from cycling and aging processes. Identifying these defects at an early stage is crucial to prevent service issues that could result in catastrophic failures. Hence, routine inspection and maintenance are crucial to prevent system collapse. To achieve this objective, conventional nondestructive testing (NDT) methods are utilized to i

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Emergency Messages Dissemination Challenges Through Connected Vehicles for Efficient Intelligent Transportation Systems: A Review
...Show More Authors

Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Oct 04 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
Perforation location optimization through 1-D mechanical earth model for high-pressure deep formations
...Show More Authors

Optimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Structural Engineering
Experimental and Numerical Evaluation of a Welded Demountable Shear Connector through Horizontal Pushout Tests
...Show More Authors

A novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode

... Show More
View Publication
Scopus (21)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and In Vitro Permeation of Chlopheniramine Maleate (CPM) from Gel through Rat Skin
...Show More Authors

Chlopheniramine maleate ( CPM ) , is  one  of   the  H- receptor antagonist  ,  widely used  in allergic  diseases ,like skin rash  and  pruritis .CPM 3%w/w was successfully  loaded in  2%w/w  sodium alginate (SA)    as a gel    base ,  and  to be considered   as  a  selected  formula .It was found  that  the diffusion   of  CPM    through   the  skin  of  albino  rat   was     increased   as  the concentration  of  CPM  increased from 2 %w/w sodium alginate  ,  More

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 02 2025
Journal Name
Al–bahith Al–a'alami
DEVOTING MEDIA PLURALISM THROUGH ACHIEVING CULTURAL DIVERSITY IN DIGITAL MEDIA: : (Features, Constituents And Obstacles )
...Show More Authors

The media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the feature

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
International Journal Of Professional Business Review
Improve the Competitive Advantage Through Human Resources Management Practices in the Iraqi Banking Sector
...Show More Authors

Purpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: competitive advantage (CA) is positively impacted by

... Show More
Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
International Journal Of Professional Business Review
Improve the Competitive Advantage Through Human Resources Management Practices in the Iraqi Banking Sector
...Show More Authors

Purpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: comp

... Show More
View Publication
Scopus (11)
Crossref (4)
Scopus Crossref