Papers by mouad M . H . Ali
Abhath Journal of Basic and Applied Sciences
The current information related to security and IoT by conducting a theoretical and methodologica... more The current information related to security and IoT by conducting a theoretical and methodological study. It provides a detailed explanation on what is the meaning of IoT and on the various applications in IoT. It also presents the major issue of the security of IoT for applications. Moreover, the chapter discusses the metrics that define lightweight algorithms in hardware and software, and it presents the reasons for choosing blocks in lightweight algorithms and studying the architecture of those blocks. It also refers to the blocks/algorithms, both the traditional ones and the lightweight ones.
In the biometrics, the technologies grow day by day and the security also increased related to th... more In the biometrics, the technologies grow day by day and the security also increased related to that technologies. The fingerprint was the most intensively researched in the field of biometrics system due to permanence and uniqueness features which made varies of different peoples. The paper addressing many stages, in addition to the primary stages of any biometrics system the fusion of unimodal system was used in order to improve the performance of the system. The double enhancement techniques were used to make the images very clear by Histogram Equalization and Fast Fourier Transformation (FFT). The feature extraction was conducted using three techniques which called Zernike Moment (ZM), Hu-Moments (Hu) and Gray-Level Co-occurrence Matrix (GLCM) that categorized to statistical and texture features. The matching between these features was performed using the Euclidean distance to find the scores matrix. Additionally, the fusion as the most modern technique was used to improve the performance of the biometrics system which performed in this work by feature level and score level fusions. The feature level fusion by using concatenation and score level fusion by using Weight sum rule strategy led to improve the performance of the system. The system was evaluated by False Accepted Rate (FAR), False Rejected Rate (FRR), Equal Error Rate (EER) and Genuine Accept Rate (GAR). The results show that, the fusion gave the most efficiency results compared with individual system. The work was tested on four datasets such as Fingerprint Verification Competition (FVC2000), (FVC2002), (FVC2004) and our department datasets which called KVK dataset. The best results were achieved by FVC2002 with maximum GAR reached to 98.45% and minimum EER of 1.54% as compared with other datasets and existing works.
Journal of Mathematics, Apr 6, 2023
Journal of Mathematics
In this article, we propose an idea of Sawi homotopy perturbation transform method (SHPTM) to der... more In this article, we propose an idea of Sawi homotopy perturbation transform method (SHPTM) to derive the analytical results of nonlinear gas dynamic (GD) equations. The implementation of this numerical scheme is straightforward and produces the results directly without any assumptions and hypothesis in the recurrence relation. Sawi transform (ST) has an advantage of reducing the computational work and the error of estimated results towards the precise solution. The results obtained with this approach are in the shape of an iteration that converges to the precise solution very gradually. We provide the validity and accuracy of this scheme with the help of illustrated examples and their graphical results. This scheme has shown to be the simplest approach for achieving the analytical results of nonlinear problems in science and engineering.
Global journal of computer science and technology, 2016
This article is an overview of a current multimodal biometrics research based on fingerprint and ... more This article is an overview of a current multimodal biometrics research based on fingerprint and palm-print. It explains the pervious study for each modal separately and its fusion technique with another biometric modal. The basic biometric system consists of four stages: firstly, the sensor which is used for enrolment & recognition the biometrics data. Secondly, the pre-processing stage which includes the enhancement and segmentation of Region-Of-Interest ROI. Thirdly, features extracted from the output of the preprocessing and each modal of biometrics having different type of features. Fourthly, the matching stage is to compare the acquired feature with the template in the database. Finally, the database which stores the features for the matching stags. Multimodal is being gathered of various types of biometrics objects from the same human. In this paper, the biometric system gives an explanation for each model. Also, the modalities of biometrics are discussed as well as focused o...
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
The palm was used in fortune telling 3000 years ago. Thus, During this period, many different pro... more The palm was used in fortune telling 3000 years ago. Thus, During this period, many different problems related to palmprint recognition have been addressed. In the recent years, the palm print has been used for biometric applications as human verification and identification. The palm print has many features comparing with a fingerprint, The palm print has number of lines. One group of these lines is known as the principle lines which contains three lines(head line, heart line and life line). The lines are extracted from palm print image by edge detection algorithm which is implementing on ROI of palm print. The main goal of edge detection algorithm is to produce a line and extract important features and reduce the amount of data in the image. This paper investigates the several edge detection methods such as Sobel, Prewitt, Roberts, LOG, and Canny. In addition, we used edge detection using local entropy information and local variance. The experiment is tested on samples taken from four palm print databases (CASIA, PolyU, IIT and database available online). The analysis work has been performed by using PSNR and MSE of resultant images on these popular edge detection methods which improve the palm print matching process. The Prewitt, Roberts and LOG edge detection methods ignore the small lines and identify only the main longer lines while the Sobel identifies the medium and longer lines. The canny edge detection algorithm identifies the complete set of edges of various sizes. From experiment it was seen that good result found with an online database and polyU database by classical edge detection methods.
International Journal of Computer Applications, 2017
The security system nowadays using biometrics traits is a confident and reliable of some biometri... more The security system nowadays using biometrics traits is a confident and reliable of some biometrics system. The reason of that is uniqueness and permanents of those traits. In this paper the Iris recognition system is covering step by steps started namely Acquisition stage ,preprocessing which includes the segmentation, pupil boundary detect and Normalization the next stage is feature extraction which used the wavelet decomposition methods , the finally the matching stage is perform with help of hamming distance measure, then the results are show in different dataset size of training and testing sets finally the evaluation of the system conducted based on FAR , FRR and EER of the system.
2016 IEEE 6th International Conference on Advanced Computing (IACC), 2016
There are various types of applications for fingerprint recognition which is used for different p... more There are various types of applications for fingerprint recognition which is used for different purposes. Fingerprint is one of the challenging pattern Recognition problem. The Fingerprint Recognition system is divided into four stages. First is Acquisition stage to capture the fingerprint image, The second is Pre-processing stage to enhancement, binarization, thinning fingerprint image. The Third stage is Feature Extraction Stage to extract the feature from the thinning image by use minutiae extractor methods to extract ridge ending and ridge bifurcation from thinning. The fourth stage is matching(Identification, Verification) to match two minutiae points by using minutiae matcher method in which similarity and distance measure are used. The algorithm is tested accurately and reliably by using fingerprint images from different databases. In this paper the fingerprint databases used are FVC2000 and FVC2002 Databases, we see that, the FVC2002 database perform better results compare with FVC2000 database. The recognition system evaluate with two factor FAR and FRR, In this system the result of FAR is 0.0154 and FRR is 0.0137 with Accuracy equal to 98.55%.
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
This article is an overview of a current research based on fingerprint recognition system. In thi... more This article is an overview of a current research based on fingerprint recognition system. In this paper we highlighted on the previous studies of fingerprint recognition system. This paper is a brief review in the conceptual and structure of fingerprint recognition. The basic fingerprint recognition system consists of four stages: firstly, the sensor which is used for enrolment & recognition to capture the biometric data. Secondly, the pre-processing stage which is used to remove unwanted data and increase the clarity of ridge structure by using enhancement technique. Thirdly, feature extraction stage which take the input from the output of the pre-processing stage to extract the fingerprint features. Fourthly, the matching stage is to compare the acquired feature with the template in the database. Finally, the database which stores the features for the matching stags. The aim of this paper is to review various recently work on fingerprint recognition system and explain fingerprint recognition stages step by step and give summaries of fingerprint databases with characteristics.
International Journal of Pharmacy and Pharmaceutical Sciences, 2019
Objective: To investigate the photochemical constituents present in methanol extract of martynia ... more Objective: To investigate the photochemical constituents present in methanol extract of martynia annua seeds using Gas Chromatography-Mass Spectroscopy(GC-MS), High-Performance Thin–Layer Chromatography(HPTLC) analysis and study antioxidant activity. Methods: Methanol extract of Martynia annua seeds were subjected to GC-MS and HPTLC analysis. HPTLC analysis was carried out using GAMAG system with a linomate5 applicator, system mobile phase (Toluene: Chloroform: Ethanol (4:4:1 V/V/V)), two different volume of extract was applied 2 µl and 5 µl. GC-MS analysis was carried out on JEOL GC MATE ΙΙ, column HP 5 MS and Quadruple double focusing mass analyzer. Antioxidant activity was determined by DPPH assay. Results: GC-MS analysis provided 17 peaks indicating the presence of seventeen different phytochemicals in methanol extract of martynia annua seeds. HPTLC fingerprint showed 6 peaks at both size 2 µl and 5 µl at 254 nm whereas 4 peaks, 9 peaks were detected at 366 nm for 2 µl and 5 µl ...
The palmprint recognition system has active research works over 15 years, which are employed on d... more The palmprint recognition system has active research works over 15 years, which are employed on different images resolution (High and Low). This paper shows the types of palmprint and problems facing the palmprint recognition system. Also, focus on the process of design palmprint biometrics system step-by-step, started from image acquisition, pre-processing, feature extraction and matching and give summary of palmprint databases with their characterizations and also we present some palmprint recognition techniques and some research works related to palmprint purposes.
Information and Communication Technology for Intelligent Systems, 2018
The popularity of Digital Image has widely increased in society. Nowadays, by the easy availabili... more The popularity of Digital Image has widely increased in society. Nowadays, by the easy availability of image editing software people can manipulate the image for malicious intent. Our proposed method is to detect inconsistency in the exact area of an image. The paper involves different steps, i.e., preprocessing, feature extraction, and matching processes. In feature extraction, we apply Discrete Cosine Transform (DCT). Evaluate our system by calculating True Positive Rate (TPR), False Positive Rate (FPR), and Area Under the Curve (AUC) of 0.3372, 0.5278, and 0.949, respectively. The results show more efficiency.
Information and Communication Technology for Intelligent Systems, 2018
This chapter presents leaf shape moment invariant features and a neural network approach to plant... more This chapter presents leaf shape moment invariant features and a neural network approach to plant classification. Leaf image samples for plant species were processed in order to find leaf shape patterns. Further leaf shape moment invariant features were extracted and then, by using a regularized neural network, plant classification accuracy was studied. Leaf image samples of five different plants were taken for classification. Invariant features are significant for classifying plants with leaves of similar shapes. A regularized neural network was used for plant classification, based on leaf shape moment invariant features. The result of the neural network model was observed for invariant features and their combination with shape features. Eighteen shape features and seven of Hu’s invariant features were extracted from sample images of leaves from five different plant classes.
Advances in Intelligent Systems and Computing, 2018
Biometrics authentication system using palmprint is played nowadays as a good research work on se... more Biometrics authentication system using palmprint is played nowadays as a good research work on selected modalities, palm print has more features compare to fingerprint and it is hard to be copied and easy to acquire. The piece of work is primarily addressing the mechanism of preprocessing, feature extraction and matching of palmprint data. The Region of Interest (ROI) extracted by using Euclidean distance. The appearance-based approach like Two-Dimension locality preserving projection (2DLPP) is used for feature extraction technique. The matching conducting in two cases Identification and Verification with help of distance measure. The experiments conducted over CASIA Multi-spectral database v1.0 and the results shown the identification was giving the result 97.33% with error rate 5.33%, while the verification result is 94.67% with error rate 2.67% of the palmprint system.
In the Human life, videos popularity has increased day by day. With the help of high qualityvideo... more In the Human life, videos popularity has increased day by day. With the help of high qualityvideo camera and video editing tools peoples easily manipulate video for malicious intent. Sonow a day, this is becoming significant topic in the recent year with more difficulties. The proposed of research work focus in texture features by using Local Binary Pattern (LBP). The object of this work is to detect video inconsistency. The work is addressing in various steps as sequentially such as preprocessing, feature extraction, matching and decision. The evaluation of propose system by using True positive Rate (TPR) and False Positive Rate (FPR). The experimental results were executives on famous dataset REWIND database, which has 20 videos which give efficiency results with evaluation parameter TPR with \(0.0258\%\), FPR with \(0.0786\%\) and Area Under Curve (AUC) = \(0.7903\%\).
Procedia Computer Science, 2017
Abstract This work based on fusion of multi-algorithm used for palmprint identification system. T... more Abstract This work based on fusion of multi-algorithm used for palmprint identification system. This piece of work is primary addressing different mechanism like Competitive Valley Hand Detection methods (CHVD) which used for extract Region of Interest (ROI). While in feature extraction the work was divided into three scenarios based on feature extraction like Local Binary Pattern (LBP), Two-Dimensional Locality Preserving Projection (2DLPP) and fusion of LBP+2DLPP.The experimental results show that fusion of LBP and 2DLPP give the best result with high accuracy reach to 98.55% which improve by 1.22% and 2.85% for LBP and 2DLPP respectively when they are applied separately.
Uploads
Papers by mouad M . H . Ali