The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems tosatisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works triedto develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different setsof features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used asa dataset for testing purpose. The results achieved by this technique indicate a high performance in signature recognition.
IRJET - A Detailed Review of Different Handwriting Recognition MethodsIRJET Journal
This document provides a detailed review of different methods for handwriting recognition, including incremental, semi-incremental, convolutional neural network, line and word segmentation, part-based, and slope and slant correction methods. It discusses the processes, benefits, and limitations of each approach. The document is intended as a review for researchers studying handwriting recognition techniques.
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
The mobile network security is becoming more important as the number of data being exchanged on the internet increases. The growing possibilities of modern mobile computing environment are potentially more vulnerable to attacks. As a result, confidentiality and data integrity becomes one of the most important problems facing Mobile IP (MIP). To address these issues, the present paper proposes a new Wavelet based watermarking scheme that hides the mobile signals and messages in the transmission. The proposed method uses the successive even and odd values of a neighborhood to insert the authenticated signals or digital watermark (DW). That is the digital watermark information is not inserted in the adjacent column and row position of a neighborhood. The proposed method resolves the ambiguity between successive even odd gray values using LSB method. This makes the present method as more simple but difficult to break, which is an essential parameter for any mobile signals and messages. To test the efficacy of the proposed DW method, various statistical measures are evaluated, which indicates high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
Signature is one of the most widely accepted personal attributes for identity verification. Signature verification is a scheme to verify cheque for bank security. So, this system is proposed as the off line handwritten signature verification system for the bank cheque image processing. In any offline signature verification system, feature extraction stage is the most vital and difficult stage. In this system, sobel gradient operator is used to extract signature features. After extracting features, this system performs the verification process by using k nearest neighbor KNN classifier. This system supports the security about the bank processing by verifying user signature from the bank cheque. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "Handwritten Signature Verification System using Sobel Operator and KNN Classifier" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27825.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/27825/handwritten-signature-verification-system-using-sobel-operator-and-knn-classifier/soe-moe-myint
Survey of Hybrid Image Compression Techniques IJECEIAES
A compression process is to reduce or compress the size of data while maintaining the quality of information contained therein. This paper presents a survey of research papers discussing improvement of various hybrid compression techniques during the last decade. A hybrid compression technique is a technique combining excellent properties of each group of methods as is performed in JPEG compression method. This technique combines lossy and lossless compression method to obtain a highquality compression ratio while maintaining the quality of the reconstructed image. Lossy compression technique produces a relatively high compression ratio, whereas lossless compression brings about high-quality data reconstruction as the data can later be decompressed with the same results as before the compression. Discussions of the knowledge of and issues about the ongoing hybrid compression technique development indicate the possibility of conducting further researches to improve the performance of image compression method.
Online signature recognition using sectorization of complex walshDr. Vinayak Bharadi
This document discusses online signature recognition using sectorization of the complex Walsh plane. It proposes extracting features from the intermediate transforms of signatures by plotting CAL and SAL functions on the complex Walsh plane. The plane is divided into blocks and mean values in each block are calculated to form feature vectors. Both unimodal and multi-algorithmic techniques are explored. Soft biometric features are also added. The Kekre transform is found to perform best, achieving 98.68% performance index for column density-based vectors. Future work could involve designing better classifiers and generating new hybrid wavelets from different transforms.
Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
The document describes a system for recognizing cursive handwriting using feature extraction and an artificial neural network. It involves preprocessing scanned images, segmenting them into individual characters, extracting features from the characters using a diagonal scanning method, and classifying the characters using a neural network. This approach provides higher recognition accuracy compared to conventional methods. The key steps are preprocessing images, segmenting into characters, extracting 54 features from each character by moving along diagonals in a grid, and training a neural network classifier on the extracted features.
This document presents a new method for image compression called Haar Wavelet Based Joint Compression Method Using Adaptive Fractal Image Compression (DWT+AFIC). It combines discrete wavelet transform with an existing adaptive fractal image compression technique to improve compression ratio and reconstructed image quality compared to previous fractal image compression methods. The document introduces fractal image compression and its limitations, describes the proposed DWT+AFIC method and 5 other compression techniques, provides simulation results on test images showing DWT+AFIC achieves higher peak signal to noise ratios and compression ratios than other methods, and concludes DWT+AFIC decreases encoding time while increasing compression ratio and maintaining reconstructed image quality.
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
This document summarizes Vinayak Ashok Bharadi's dissertation on signature recognition using clustering techniques. It introduces the topic, outlines the problem definition and steps in signature recognition. It then discusses several preprocessing techniques, feature extraction methods like global features, grid and texture information, vector quantization, Walsh coefficients, and successive geometric centers. The document presents results and concludes by discussing the application of clustering techniques to signature recognition.
IRJET - A Detailed Review of Different Handwriting Recognition MethodsIRJET Journal
This document provides a detailed review of different methods for handwriting recognition, including incremental, semi-incremental, convolutional neural network, line and word segmentation, part-based, and slope and slant correction methods. It discusses the processes, benefits, and limitations of each approach. The document is intended as a review for researchers studying handwriting recognition techniques.
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
The mobile network security is becoming more important as the number of data being exchanged on the internet increases. The growing possibilities of modern mobile computing environment are potentially more vulnerable to attacks. As a result, confidentiality and data integrity becomes one of the most important problems facing Mobile IP (MIP). To address these issues, the present paper proposes a new Wavelet based watermarking scheme that hides the mobile signals and messages in the transmission. The proposed method uses the successive even and odd values of a neighborhood to insert the authenticated signals or digital watermark (DW). That is the digital watermark information is not inserted in the adjacent column and row position of a neighborhood. The proposed method resolves the ambiguity between successive even odd gray values using LSB method. This makes the present method as more simple but difficult to break, which is an essential parameter for any mobile signals and messages. To test the efficacy of the proposed DW method, various statistical measures are evaluated, which indicates high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
Signature is one of the most widely accepted personal attributes for identity verification. Signature verification is a scheme to verify cheque for bank security. So, this system is proposed as the off line handwritten signature verification system for the bank cheque image processing. In any offline signature verification system, feature extraction stage is the most vital and difficult stage. In this system, sobel gradient operator is used to extract signature features. After extracting features, this system performs the verification process by using k nearest neighbor KNN classifier. This system supports the security about the bank processing by verifying user signature from the bank cheque. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "Handwritten Signature Verification System using Sobel Operator and KNN Classifier" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27825.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/27825/handwritten-signature-verification-system-using-sobel-operator-and-knn-classifier/soe-moe-myint
Survey of Hybrid Image Compression Techniques IJECEIAES
A compression process is to reduce or compress the size of data while maintaining the quality of information contained therein. This paper presents a survey of research papers discussing improvement of various hybrid compression techniques during the last decade. A hybrid compression technique is a technique combining excellent properties of each group of methods as is performed in JPEG compression method. This technique combines lossy and lossless compression method to obtain a highquality compression ratio while maintaining the quality of the reconstructed image. Lossy compression technique produces a relatively high compression ratio, whereas lossless compression brings about high-quality data reconstruction as the data can later be decompressed with the same results as before the compression. Discussions of the knowledge of and issues about the ongoing hybrid compression technique development indicate the possibility of conducting further researches to improve the performance of image compression method.
Online signature recognition using sectorization of complex walshDr. Vinayak Bharadi
This document discusses online signature recognition using sectorization of the complex Walsh plane. It proposes extracting features from the intermediate transforms of signatures by plotting CAL and SAL functions on the complex Walsh plane. The plane is divided into blocks and mean values in each block are calculated to form feature vectors. Both unimodal and multi-algorithmic techniques are explored. Soft biometric features are also added. The Kekre transform is found to perform best, achieving 98.68% performance index for column density-based vectors. Future work could involve designing better classifiers and generating new hybrid wavelets from different transforms.
Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
The document describes a system for recognizing cursive handwriting using feature extraction and an artificial neural network. It involves preprocessing scanned images, segmenting them into individual characters, extracting features from the characters using a diagonal scanning method, and classifying the characters using a neural network. This approach provides higher recognition accuracy compared to conventional methods. The key steps are preprocessing images, segmenting into characters, extracting 54 features from each character by moving along diagonals in a grid, and training a neural network classifier on the extracted features.
This document presents a new method for image compression called Haar Wavelet Based Joint Compression Method Using Adaptive Fractal Image Compression (DWT+AFIC). It combines discrete wavelet transform with an existing adaptive fractal image compression technique to improve compression ratio and reconstructed image quality compared to previous fractal image compression methods. The document introduces fractal image compression and its limitations, describes the proposed DWT+AFIC method and 5 other compression techniques, provides simulation results on test images showing DWT+AFIC achieves higher peak signal to noise ratios and compression ratios than other methods, and concludes DWT+AFIC decreases encoding time while increasing compression ratio and maintaining reconstructed image quality.
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
This document summarizes Vinayak Ashok Bharadi's dissertation on signature recognition using clustering techniques. It introduces the topic, outlines the problem definition and steps in signature recognition. It then discusses several preprocessing techniques, feature extraction methods like global features, grid and texture information, vector quantization, Walsh coefficients, and successive geometric centers. The document presents results and concludes by discussing the application of clustering techniques to signature recognition.
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
The document summarizes research on signature recognition using successive geometric centers, grid, and texture features. It discusses extracting features from dynamic signatures captured using a digitizer tablet. Successive geometric centers are extracted from segmented regions of the signature at different depths. Grid features provide pixel density information across a segmented grid. Texture features capture pressure pattern transitions. The features are evaluated for signature recognition and verification performance based on metrics like true acceptance and rejection rates. The goal is to analyze the proposed method and improve over existing systems.
Finger Print Image Compression for Extracting Texture Features and Reconstru...IOSR Journals
The document summarizes a method for fingerprint image compression that involves decomposing the image into two components - ridges (primary component) and textures/features (secondary component). The ridges are extracted and encoded using arithmetic coding combined with vector quantization, achieving a higher compression ratio than FBI standards. The decoding process reconstructs a hybrid surface based on the encoded ridges. The method allows for extracting minutiae directly from the compressed image without needing decompression, and provides both compression and the ability to reconstruct the original image. Experimental results show the compression ratio is better than FBI specified methods.
Automatic image slice marking propagation on segmentation of dental CBCTTELKOMNIKA JOURNAL
Cone Beam Computed Tomography (CBCT) is a radiographic technique that has been commonly
used to help doctors provide more detailed information for further examination. Teeth segmentation on
CBCT image has many challenges such as low contrast, blurred teeth boundary and irregular contour of
the teeth. In addition, because the CBCT produces a lot of slices, in which the neighboring slices have
related information, the semi-automatic image segmentation method, that needs manual marking from
the user, becomes exhaustive and inefficient. In this research, we propose an automatic image slice
marking propagation on segmentation of dental CBCT. The segmentation result of the first slice will
be propagated as the marker for the segmentation of the next slices. The experimental results show that
the proposed method is successful in segmenting the teeth on CBCT images with the value of
Misclassification Error (ME) and Relative Foreground Area Error (RAE) of 0.112 and 0.478, respectively.
The document summarizes an automatic text extraction system for complex images. The system uses discrete wavelet transform for text localization. Morphological operations like erosion and dilation are used to enhance text identification and segmentation. Text regions are segmented using connected component analysis and properties like area and bounding box shape. The extracted text is recognized and shown in a text file. The system allows modifying the recognized text and shows better performance than existing techniques.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modified Skip Line Encoding for Binary Image Compressionidescitation
This paper proposes a modified skip line encoding technique for lossless compression of binary images. Skip line encoding exploits correlation between successive scan lines by encoding only one line and skipping similar lines. The proposed technique improves upon existing skip line encoding by allowing a scan line to be skipped if a similar line exists anywhere in the image, rather than just successive lines. Experimental results on sample images show the modified technique achieves higher compression ratios than conventional skip line encoding.
This paper proposes a signature verification system that uses feature extraction on Java and data classification using a neural network on Python. It is designed for small computational devices. The system takes in a signature, preprocesses it, extracts global, statistical and local features in Java. These features are then classified using a neural network developed in Python. Experimental results show the system achieves 95% accuracy for signature verification. Key parameters like learning rate, momentum, epochs were optimized. The system provides interoperability across platforms and is suitable for applications on small devices.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document describes an online signature verification system that uses vector quantization and hidden Markov models. Signatures are collected using a graphics tablet and preprocessed to reduce noise and normalize size and phase. Features like velocity, acceleration, and pressure are extracted from segments of each signature. K-means clustering is used to generate a codebook, and vector quantization maps signatures to code words. Hidden Markov models are trained on the code words using the Baum-Welch algorithm. In verification, the forward algorithm calculates the probability that a signature was generated by a claimed user's model. The system achieved an equal error rate of 14% for verification.
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET Journal
This document summarizes a research paper on detecting plant diseases from images using digital image processing techniques. The main steps discussed are: 1) Acquiring digital images of plant leaves, 2) Pre-processing the images by cropping, converting to grayscale, and enhancing, 3) Segmenting the images using k-means clustering to identify infected regions, 4) Extracting color, texture, and shape features from the segmented images, and 5) Classifying the images using a support vector machine to identify the type of disease. The proposed method was tested on images of citrus leaves to detect different diseases and future work aims to improve classification accuracy for other plant species.
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
In this project, a support vector machine is developed for identity verification of offline signature based on the matrices derived through Euclidean distance. A set of signature samples are collected from 35 different people. Each person gives his 15 different copies of signature and then these signature samples are scanned to have softcopy of them to train SVM. These scanned signature images are then subjected to a number of image enhancement operations like binarization, complementation, filtering, thinning, edge detection and rotation. On the basis of 15 original signature copies from each individual, Euclidean distance is calculated. And every tested image is compared with the range of Euclidean distance. The values from the ED are fed to the support vector machine which draws a hyper plane and classifies the signature into original or forged based on a particular feature value.
The quality of image encryption techniques by reasoned logicTELKOMNIKA JOURNAL
One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.
IRJET- Crowd Density Estimation using Image ProcessingIRJET Journal
This document describes a research project that uses image processing techniques to estimate crowd density. Specifically, it uses skin color detection and morphological operations to identify and count the number of people in an image. It begins with an abstract that introduces the topic and objectives. It then provides background information on relevant color models and traditional crowd density estimation approaches. The proposed system is described as using skin color detection in the HSV color space to identify skin pixels, followed by morphological operations to find and count human faces, in order to efficiently and accurately estimate crowd density in images.
This document presents a digital image watermarking technique using Hadamard transform. The key steps are:
1. The image is divided into 8x8 blocks and Hadamard transform applied to get coefficients. Breadth-first search is used to select efficient embedding points among the positive coefficients.
2. Prime numbered blocks are avoided for embedding. Two points in the first column are selected for embedding the watermark.
3. Cox's equation is used to embed the watermark in the host image coefficients. Inverse Hadamard transform generates the watermarked image.
4. To extract the watermark, the process is reversed using the visited matrix of points. Experiments show the technique provides better image
This document describes a voice recognition system using Linear Predictive Coding (LPC) and Hidden Markov Models (HMM) to recognize commands for controlling a robot. The system is designed to recognize five basic robot movements ("forward", "reverse", "left", "right", and "stop") from voice inputs. It uses LPC to extract features from voice samples and HMM with vector quantization to build a codebook model and train the recognition system. The goal is to test the accuracy of the system in recognizing commands, even from voices not currently in the training database.
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
The document describes a study that used a convolutional neural network (CNN) and three classifiers - support vector machine (SVM), k-nearest neighbors (KNN), and naive Bayes (NB) - to recognize offline signatures. A pre-trained CNN was used to extract features from signature images, which were then classified using the three algorithms. The SVM, KNN, and NB classifiers were compared based on run time, classification error, classification loss, and accuracy. The results showed that the SVM and KNN classifiers achieved the best accuracy of 76.21% and had faster run times and lower error rates than the NB classifier. Therefore, the SVM performed the best overall for offline signature recognition.
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Enhanced Image Compression Using WaveletsIJRES Journal
Data compression which can be lossy or lossless is required to decrease the storage requirement and better data transfer rate. One of the best image compression techniques is using wavelet transform. It is comparatively new and has many advantages over others. Wavelet transform uses a large variety of wavelets for decomposition of images. The state of the art coding techniques like HAAR, SPIHT (set partitioning in hierarchical trees) and use the wavelet transform as basic and common step for their own further technical advantages. The wavelet transform results therefore have the importance which is dependent on the type of wavelet used .In our thesis we have used different wavelets to perform the transform of a test image and the results have been discussed and analyzed. Haar, Sphit wavelets have been applied to an image and results have been compared in the form of qualitative and quantitative analysis in terms of PSNR values and compression ratios. Elapsed times for compression of image for different wavelets have also been computed to get the fast image compression method. The analysis has been carried out in terms of PSNR (peak signal to noise ratio) obtained and time taken for decomposition and reconstruction.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. The document describes a system for online signature verification using Discrete Cosine Transform (DCT). Signatures are acquired using a tablet and features are extracted from the x and y coordinates and theta values. DCT is applied to compress the signature features.
2. The system is tested on 125 signatures from 25 signers. Genetic algorithms are used for classification. The system provides output as "genuine signature" or "forged signature" and calculates false acceptance and rejection rates to evaluate performance.
3. Experimental results found the proposed DCT-based approach to be promising for online signature verification by extracting dynamic features while keeping basic signature information.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
The document summarizes research on signature recognition using successive geometric centers, grid, and texture features. It discusses extracting features from dynamic signatures captured using a digitizer tablet. Successive geometric centers are extracted from segmented regions of the signature at different depths. Grid features provide pixel density information across a segmented grid. Texture features capture pressure pattern transitions. The features are evaluated for signature recognition and verification performance based on metrics like true acceptance and rejection rates. The goal is to analyze the proposed method and improve over existing systems.
Finger Print Image Compression for Extracting Texture Features and Reconstru...IOSR Journals
The document summarizes a method for fingerprint image compression that involves decomposing the image into two components - ridges (primary component) and textures/features (secondary component). The ridges are extracted and encoded using arithmetic coding combined with vector quantization, achieving a higher compression ratio than FBI standards. The decoding process reconstructs a hybrid surface based on the encoded ridges. The method allows for extracting minutiae directly from the compressed image without needing decompression, and provides both compression and the ability to reconstruct the original image. Experimental results show the compression ratio is better than FBI specified methods.
Automatic image slice marking propagation on segmentation of dental CBCTTELKOMNIKA JOURNAL
Cone Beam Computed Tomography (CBCT) is a radiographic technique that has been commonly
used to help doctors provide more detailed information for further examination. Teeth segmentation on
CBCT image has many challenges such as low contrast, blurred teeth boundary and irregular contour of
the teeth. In addition, because the CBCT produces a lot of slices, in which the neighboring slices have
related information, the semi-automatic image segmentation method, that needs manual marking from
the user, becomes exhaustive and inefficient. In this research, we propose an automatic image slice
marking propagation on segmentation of dental CBCT. The segmentation result of the first slice will
be propagated as the marker for the segmentation of the next slices. The experimental results show that
the proposed method is successful in segmenting the teeth on CBCT images with the value of
Misclassification Error (ME) and Relative Foreground Area Error (RAE) of 0.112 and 0.478, respectively.
The document summarizes an automatic text extraction system for complex images. The system uses discrete wavelet transform for text localization. Morphological operations like erosion and dilation are used to enhance text identification and segmentation. Text regions are segmented using connected component analysis and properties like area and bounding box shape. The extracted text is recognized and shown in a text file. The system allows modifying the recognized text and shows better performance than existing techniques.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modified Skip Line Encoding for Binary Image Compressionidescitation
This paper proposes a modified skip line encoding technique for lossless compression of binary images. Skip line encoding exploits correlation between successive scan lines by encoding only one line and skipping similar lines. The proposed technique improves upon existing skip line encoding by allowing a scan line to be skipped if a similar line exists anywhere in the image, rather than just successive lines. Experimental results on sample images show the modified technique achieves higher compression ratios than conventional skip line encoding.
This paper proposes a signature verification system that uses feature extraction on Java and data classification using a neural network on Python. It is designed for small computational devices. The system takes in a signature, preprocesses it, extracts global, statistical and local features in Java. These features are then classified using a neural network developed in Python. Experimental results show the system achieves 95% accuracy for signature verification. Key parameters like learning rate, momentum, epochs were optimized. The system provides interoperability across platforms and is suitable for applications on small devices.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document describes an online signature verification system that uses vector quantization and hidden Markov models. Signatures are collected using a graphics tablet and preprocessed to reduce noise and normalize size and phase. Features like velocity, acceleration, and pressure are extracted from segments of each signature. K-means clustering is used to generate a codebook, and vector quantization maps signatures to code words. Hidden Markov models are trained on the code words using the Baum-Welch algorithm. In verification, the forward algorithm calculates the probability that a signature was generated by a claimed user's model. The system achieved an equal error rate of 14% for verification.
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET Journal
This document summarizes a research paper on detecting plant diseases from images using digital image processing techniques. The main steps discussed are: 1) Acquiring digital images of plant leaves, 2) Pre-processing the images by cropping, converting to grayscale, and enhancing, 3) Segmenting the images using k-means clustering to identify infected regions, 4) Extracting color, texture, and shape features from the segmented images, and 5) Classifying the images using a support vector machine to identify the type of disease. The proposed method was tested on images of citrus leaves to detect different diseases and future work aims to improve classification accuracy for other plant species.
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
In this project, a support vector machine is developed for identity verification of offline signature based on the matrices derived through Euclidean distance. A set of signature samples are collected from 35 different people. Each person gives his 15 different copies of signature and then these signature samples are scanned to have softcopy of them to train SVM. These scanned signature images are then subjected to a number of image enhancement operations like binarization, complementation, filtering, thinning, edge detection and rotation. On the basis of 15 original signature copies from each individual, Euclidean distance is calculated. And every tested image is compared with the range of Euclidean distance. The values from the ED are fed to the support vector machine which draws a hyper plane and classifies the signature into original or forged based on a particular feature value.
The quality of image encryption techniques by reasoned logicTELKOMNIKA JOURNAL
One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.
IRJET- Crowd Density Estimation using Image ProcessingIRJET Journal
This document describes a research project that uses image processing techniques to estimate crowd density. Specifically, it uses skin color detection and morphological operations to identify and count the number of people in an image. It begins with an abstract that introduces the topic and objectives. It then provides background information on relevant color models and traditional crowd density estimation approaches. The proposed system is described as using skin color detection in the HSV color space to identify skin pixels, followed by morphological operations to find and count human faces, in order to efficiently and accurately estimate crowd density in images.
This document presents a digital image watermarking technique using Hadamard transform. The key steps are:
1. The image is divided into 8x8 blocks and Hadamard transform applied to get coefficients. Breadth-first search is used to select efficient embedding points among the positive coefficients.
2. Prime numbered blocks are avoided for embedding. Two points in the first column are selected for embedding the watermark.
3. Cox's equation is used to embed the watermark in the host image coefficients. Inverse Hadamard transform generates the watermarked image.
4. To extract the watermark, the process is reversed using the visited matrix of points. Experiments show the technique provides better image
This document describes a voice recognition system using Linear Predictive Coding (LPC) and Hidden Markov Models (HMM) to recognize commands for controlling a robot. The system is designed to recognize five basic robot movements ("forward", "reverse", "left", "right", and "stop") from voice inputs. It uses LPC to extract features from voice samples and HMM with vector quantization to build a codebook model and train the recognition system. The goal is to test the accuracy of the system in recognizing commands, even from voices not currently in the training database.
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
The document describes a study that used a convolutional neural network (CNN) and three classifiers - support vector machine (SVM), k-nearest neighbors (KNN), and naive Bayes (NB) - to recognize offline signatures. A pre-trained CNN was used to extract features from signature images, which were then classified using the three algorithms. The SVM, KNN, and NB classifiers were compared based on run time, classification error, classification loss, and accuracy. The results showed that the SVM and KNN classifiers achieved the best accuracy of 76.21% and had faster run times and lower error rates than the NB classifier. Therefore, the SVM performed the best overall for offline signature recognition.
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Enhanced Image Compression Using WaveletsIJRES Journal
Data compression which can be lossy or lossless is required to decrease the storage requirement and better data transfer rate. One of the best image compression techniques is using wavelet transform. It is comparatively new and has many advantages over others. Wavelet transform uses a large variety of wavelets for decomposition of images. The state of the art coding techniques like HAAR, SPIHT (set partitioning in hierarchical trees) and use the wavelet transform as basic and common step for their own further technical advantages. The wavelet transform results therefore have the importance which is dependent on the type of wavelet used .In our thesis we have used different wavelets to perform the transform of a test image and the results have been discussed and analyzed. Haar, Sphit wavelets have been applied to an image and results have been compared in the form of qualitative and quantitative analysis in terms of PSNR values and compression ratios. Elapsed times for compression of image for different wavelets have also been computed to get the fast image compression method. The analysis has been carried out in terms of PSNR (peak signal to noise ratio) obtained and time taken for decomposition and reconstruction.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. The document describes a system for online signature verification using Discrete Cosine Transform (DCT). Signatures are acquired using a tablet and features are extracted from the x and y coordinates and theta values. DCT is applied to compress the signature features.
2. The system is tested on 125 signatures from 25 signers. Genetic algorithms are used for classification. The system provides output as "genuine signature" or "forged signature" and calculates false acceptance and rejection rates to evaluate performance.
3. Experimental results found the proposed DCT-based approach to be promising for online signature verification by extracting dynamic features while keeping basic signature information.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
This document summarizes a research paper on traffic sign recognition using convolutional neural networks (CNNs). It discusses how a two-tier CNN architecture combined with YOLO networks can accurately detect and identify traffic signs, even in adverse weather conditions. The first part provides background on traffic sign recognition and related work using methods like support vector machines and HOG features. It then describes the current implementation which uses a two-tier CNN for sign detection and identification, and analyzes the results showing over 95% accuracy. In conclusion, the implementation proves effective for traffic sign recognition under varying conditions.
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
This paper presents the design of a fingerprint authentication system based on a simple microcontroller and the fingerprint sensor. The circuit diagram and details regarding the procedure are included. The system was programed in MPLAB and then embedded into the microcontroller. Communication between the PIC and sensor is by RS232 protocol. The results show that the system recognizes the fingerprint in less than 1 second. It is portable and there is no need for image processing. Furthermore, the system shows a high effectiveness when storing and verifying fingerprints.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document describes an enhanced authentication system that uses both face recognition and fingerprint verification technologies. It begins with an overview of the general architecture, which divides the system into fingerprint recognition and face recognition parts. It then provides details on the fingerprint enrollment and verification processes, including image enhancement, minutiae extraction, and template matching. Next, it covers the face detection, preprocessing, feature extraction, training, and recognition steps. The system was implemented using VB.NET and a neural network approach. It was tested using various faces and fingerprints, with one template selected per person and remaining images used for training and testing. The results demonstrated the system's ability to perform multi-biometric identification.
This document presents a proposed methodology for offline signature recognition. It begins with an introduction to biometrics and signature recognition. It then defines the problem of determining whose signature an image belongs to. The proposed methodology includes image acquisition, pre-processing steps like conversion to grayscale and thinning, feature extraction of global and grid features, training a neural network, and testing. It concludes that combining global and grid features extracted using discrete wavelet transform achieves recognition accuracy rates ranging from 93-89% for databases of 10 to 50 signatures.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
This document summarizes a research paper that proposes an image preprocessing algorithm to improve the quality of digital fingerprint images for recognition purposes. The algorithm includes steps like grayscale conversion, image normalization, segmentation to remove noisy areas, estimation of directional and frequency maps to determine fingerprint ridge orientation and frequency. The goal is to enhance image quality before feature extraction and matching, which can improve recognition performance by reducing errors and processing time.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
This document discusses a proposed system for improving graphical user interfaces using hand gesture detection. The system aims to allow users to access information from the internet without using input devices like a mouse or keyboard. It uses a webcam to capture images of hand gestures, which are then processed using techniques like skin color segmentation, principal component analysis, and template matching to recognize the gestures. The recognized gestures can then be linked to retrieving specific data from pre-defined URLs. An evaluation of the system found it had an accuracy rate of 90% in real-time testing for retrieving data from 10 different URLs using 10 unique hand gestures. The proposed system provides a more convenient interface compared to traditional mouse and keyboard methods.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
One of the most promising mechanisms in the field of security and information safety is authentication based on palm vein. The main reasons that vein palm becomes an authentication method is because of its distinctive privacy, as it is difficult to manipulate or change its results, because of the location of the vein within the palm. With the use of this technology, it has become easy to maintain data from unauthorized access and unwanted persons. In this work proposed model are suggested that contain four stages to reach the results: in the first stage is the pre-processing stage where histogram equation was used to enhance the image and the properties are shown, the second stage is the extracting the properties where, Gabor filter and 2-discrete wavelet filters are suggested for features extraction, where it is considered one of the most important filters used to extract the features, as well as in the third stage "PCA" are used for data or features reduction, because of its advantages in analyzing the features and reducing the spacing between them. As for the last stage, the Euclidean distance used to measure the spacing. The results were acceptable and convincing, since the similarity ratio 96.2%. These results were obtained after several tests and using the Gabor filter with 2D-discrete wavelet transform and principal component analysis (PCA), I got the best results.
This document presents a simple signature recognition system that uses invariant central moment and modified Zernike moment for feature extraction. The system is divided into preprocessing, feature extraction, and recognition/verification stages. In preprocessing, the input signature image is converted to grayscale and binary, and the region of interest is extracted. Feature extraction uses invariant central moments and Zernike moments to extract shape features. Recognition and verification is performed using a backpropagation neural network for its high accuracy and low computational complexity. The system was tested on a database of 500 signatures from 50 individuals and achieved suitable performance for signature verification.
This document summarizes a research paper about a simple signature recognition system designed using MATLAB. The system extracts features from signatures using invariant central moment and modified Zernike moment for invariant feature extraction. It is divided into preprocessing, feature extraction, and recognition/verification. Preprocessing prepares the signature image for processing. Feature extraction uses invariant central moments and Zernike moments. Recognition uses a backpropagation neural network for classification. The system was tested on a database of 500 signatures from 50 individuals, achieving high accuracy and low computational complexity.
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
This document proposes an enhanced signature verification system using K-nearest neighbors (KNN) classification. It discusses how signature verification aims to automatically determine if a biometric sample matches a claimed identity. The proposed system extracts features from signatures and uses KNN to classify signatures as genuine or forgeries. It also reviews related work on signature verification using techniques like artificial immune systems and discusses preprocessing steps like normalization to standardize signature size and reduce variations between signatures.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
The document describes a gesture recognition system that uses computer vision techniques. It discusses different approaches to hand gesture recognition including vision-based, glove-based, and depth-based techniques. The proposed system uses computer vision and media pipe libraries to track hand landmarks and recognize gestures in real-time. It then uses those gestures to control functions like a virtual mouse, change volume, and zoom in/out. The system aims to provide natural human-computer interaction through contactless hand gesture recognition.
Distance Based Verification Technique for Online Signature SystemIRJET Journal
1) The document describes a distance-based technique for online signature verification. It extracts histogram features from the x-coordinate, y-coordinate, and angle of signatures and represents each signature as a feature vector.
2) Euclidean distance is then used to calculate the distance between feature vectors and verify signatures. Experimental results obtained using Euclidean distance show the false acceptance rate and false rejection rate for individual signatures.
3) The technique involves data acquisition from a signature tablet, preprocessing through normalization, histogram feature extraction, and verification using Euclidean distance between feature vectors.
A Transfer Learning Approach to Traffic Sign RecognitionIRJET Journal
This document presents a study on traffic sign recognition using transfer learning with three pre-trained convolutional neural network models: InceptionV3, Xception, and ResNet50. The models were trained on the German Traffic Sign Recognition Benchmark dataset containing 43 classes of traffic signs. InceptionV3 achieved the highest test accuracy of 97.15% for traffic sign classification, followed by Xception at 96.79%, while ResNet50 performed poorly with only 60.69% accuracy. Transfer learning with InceptionV3 is shown to be an effective approach for traffic sign recognition tasks.
Similar to Offline signatures matching using haar wavelet subbands (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Offline signatures matching using haar wavelet subbands
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 6, December 2020, pp. 2903~2910
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i6.17069 2903
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Offline signatures matching using haar wavelet subbands
Zinah S. Abduljabbar1
, Zainab J. Ahmed2
, Noor Khalid Ibrahim3
1,3
Department of Computer Science, College of Science, Mustansiriyah University, Iraq
2
Department of Biology Science, College of Science, University of Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jun 26, 2020
Revised Jul 20, 2020
Accepted Aug 21, 2020
The complexity of multimedia contents is significantly increasing in the current
world. This leads to an exigent demand for developing highly effective systems to
satisfy human needs. Until today, handwritten signature considered an important
means that is used in banks and businesses to evidence identity, so there are many
works tried to develop a method for recognition purpose. This paper introduced an
efficient technique for offline signature recognition depending on extracting the
local feature by utilizing the haar wavelet subbands and energy. Three different sets
of features are utilized by partitioning the signature image into non overlapping
blocks where different block sizes are used. CEDAR signature database is used as
a dataset for testing purpose. The results achieved by this technique indicate a high
performance in signature recognition.
Keywords:
Energy
Haar wavelet
Signature recognition
This is an open access article under the CC BY-SA license.
Corresponding Author:
Zinah S. Abduljabbar,
Department of Computer Science, College of Science,
Mustansiriyah University,
Baghdad, Iraq.
Email: zinahsadeq@uomustansiriyah.edu.iq
1. INTRODUCTION
Lately a major amount of research effort is being dedicated in developing the algorithms and
techniques related to signatures field. Behavioral, physiological and psychological characteristics are used in
biometric systems for identifying the individual. Handwritten signatures are a type of the behavioral
characteristics, although with the development of other biometric characteristics but the signature remain quite
important [1]. Therefore, signature is an important guide to validate a document handwritten signature of a
person which recognized by signature verification [2]. Despite the great development in knowledge-based
systems, handwriting signatures remain of particular importance and this may be due to the fact that those
systems require user guides in the form of information, often a password and id, to verify the identity of
the individual, in addition to the above, the signature cannot be stolen or missing [3]. Methodology of signature
recognition comprises four general steps which are: data acquisition, pre-processing, feature extraction and
matching. There are two categories in handwritten signatures according to the method of data acquisition:
on-line (dynamic approach) and off-line (static approach).
Any person may use letters or symbols or a combination of both to represent the signature.
Accordingly, the signature must be treated as an image [4]. In offline mode camera and scanner are used to
obtain the images of the signatures from a paper, in such situation noisy signatures are acquired compared to
these in on-line mode [5]. Many studies have been introduced as literature. Hazem et al. [6] presented a system for
verification the off-line signature. The system comprises of four steps: preprocessing step, registration of signature,
feature extraction and verification step. Discrete wavelet transform (DWT) was used in this system to extract
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2904
the feature from signature and mathematical formulae with logical operations were utilized in verification step.
The system obtained good measures for verification [6].
Doroz et al. [7] introduced a new method for verification the handwriting signatures. In this method
the signature was described by creating a complex characteristic for each signature, the created characteristics
were based on dependencies analysis between the dynamic characteristics which registered in the tables.
Complex characteristics were utilized to create vectors for describing characteristics, by using the suggested
measures, the elements of vectors were computed. Evaluated the similarity between the signatures had been
accomplished by determining the similarity of corresponding vectors of the compared signatures. 96.67% was
the results obtained by this method [7].
Malik and Arova [3] presented a method for signature recognition. Euler number was used to study
the signatures of various people. Their adopted method consists of three phases. In the first phase, two sets of
feature vectors were generated by extracting the features of training signatures dataset and features of testing
signatures. In the second phase, using Manhattan distance classifier to compare between the training signature
feature and the set of the feature of the testing signatures. The result of recognition was displayed to the user
in the last phase. The train and test data which used in dataset had a little change but the suggested method can
be extended to dataset which had a great change of the train and test data [3].
Hedjaz et al. [8] introduced an approach for recognition the offline signature. Binary statistical image
features (BSIF) and local binary patterns (LBP) were used to extract the features. Two public datasets were
used: MCYT-75 and GPD-100. By utilizing a K-nearest neighbor (KNN) classifier a performance of
recognition reaches 97.3% for MCYT-75 and 96.1% for GPDS-100 [8]. The main contribution of this paper as
follow: to introduced an efficient technique for offline signature recognition depending on extracting the local
feature by utilizing the haar wavelet subbands and energy.
2. PROPOSED SYSTEM
This work aims to develop an efficient technique for offline signature recognition depending on
extracting the local feature by utilizing the haar wavelet subbands and energy. The proposed approach is
composed of the following steps: The layout of the suggested signature system is appeared in Figure 1.
The flow of the proposed work is as follows: the system consists of three main phases: pre-processing phase,
feature extraction, binarization and matching, the details of each one is introduced in the next sections.
Figure 1. The layout of system model
2.1. Pre-processing phase
The preprocessing phase consists of some steps, due to the noise that occurs in offline signatures
mode, pre-processing is an essential point to start a real treatment phase where the importance of pre-processing
lies in getting rid of the visual and unwanted information in the signature form and establishes to prepare for
successful feature extraction.
3. TELKOMNIKA Telecommun Comput El Control
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2905
2.1.2. Load signature image stage
The pre-processing first involves loading and preparing the signature image by obtaining a gray-scale
image (GI) from a BMP image (I), loads an image into a variable of type of image. Four types of images (.gif,
.jpg, .tga, .png) images may be loaded. To load correctly, images must be located in the data directory of
the current sketch. The gray-scale image should enhance to gain the best results as clarify below:
2.1.3. Enhancement stage on signature image
Four steps are applied in order to enhance the signature image and obtain a clearer form:
− Inversion the color
As mentioned earlier, the signature image which obtained by a camera or scanner is noisier than others
image in on-line situation approach and accordingly color inversion process is utilized to allocate the required
region by specifying only the important data (signature's part) and cancelation the unwanted data surrounding
to the signature. By moving (𝑛 ∗ 𝑛) window on the gray-scale signature image and at each instance position in
the window the threshold is applied as described in (1):
𝐺𝐼̅̅̅(𝑖, 𝑗) = {
𝑚𝑒𝑎𝑛 − 𝐺𝐼(𝑖, 𝑗) 𝑖𝑓 𝐺𝐼(𝑖, 𝑗) < 𝑚𝑒𝑎𝑛
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(1)
where 𝐺𝐼̅̅̅̅is the signature image after inversion it’s color.
− Removing the noise
Noise reduction is an essential step in image processing due to its importance in obtaining better
results, the block matching with three-dimensional filtering (BM3D) denoising is used in this step. Many
studies shown that the BM3D filter is very important in term of noise reduction due to its results comparing
with other filters [9, 10]. The implementation of this filter is explained in detail in [11]
− Contrast
The subjective criteria of images are important for human visualization, so an appropriate contrast in
an image is desired to make the signature more distinct from the background and other objects. Visual
properties of an image are enhanced by applying a method proposed in [12].
In this method a global mean 𝐺 𝑚𝑒𝑎𝑛 is computed by applying average filter on the whole input image
while local means𝐿 𝑚𝑒𝑎𝑛 are computed by applying the same filter on each 3 × 3 block in an image. By applying
the transformation in (2):
𝑂(𝑖, 𝑗) = 𝑁(𝑖, 𝑗) + [𝐿 𝑚𝑒𝑎𝑛 − 𝐺 𝑚𝑒𝑎𝑛] (2)
where 𝑂(𝑖, 𝑗) acts the pixels of the image after contrast process and 𝑁(𝑖, 𝑗) acts the pixels of the image after
applying BM3D filter.
− Segmentation
Focusing on the signature area in the image and neglecting the remaining unimportant parts is
the primary goal at this step. This is achieved by detecting each row and column, then removes these rows and
columns which don't contain the signature's information. Recently, more attention paid on the unsupervised
image co-segmentation approach, where the segments are forced to be consistent across a collection of similar
images. Many natural image collections contain similar or related objects. For instance, photo collections of a
particular theme.
2.1.4. Binarization
Image binarization is one of the basic pre-processing steps that leads to a considerable reduction in
the amount of information that is undergo to further analysis, which leads to faster implementation and this is
very useful in applications which required the recognition of the shape rather than the color analysis [13].
The most important aspect of this operation is to find the appropriate threshold value, assigning a single value
to threshold and apply this value to whole image is called global binarization technique [14]. In this work
the best threshold value is determined by test and the output of binarization operation is a signature image
contain 1's and 0's for all pixels according the following in (3):
𝑏(𝑖, 𝑗) = {
1 𝑖𝑓 𝑓(𝑖, 𝑗) ≥ 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(3)
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2906
2.1.5. Morphological operation
Thinning is a type of morphological operation; the goal of thinning process is to find the skeleton of
on object. A skeleton that finds the fundamental topology and the information's shape of the required object in
a simple form is very important to hold different problems. To achieve the morphological operation,
Zhang Suen algorithm is applied because it's fastest and the implementation of this algorithm is simple; after
the binary image is used as input, decreases the pixels and represent the skeleton of the signature in one-pixel
width [15, 16].
2.2. DWT and feature extraction phase
The wavelet is an efficient multi-resolution technique for sub-band decomposition, and this is
performed by implementing a digital filtering [17-19]. The low and high pass filters are used to obtain
the approximation information and detail information respectively [17]. DWT utilizing filtering and sub-
sampling to decompose the signature image in multi scales which leads to reveals the redundancies in many
scales.
2.2.1. Haar wavelet transform
Haar wavelet transform is used to extract the local features in the signature image. One of
the important aspect of haar wavelet transform is to find corners and contours [18-21]. The reason for choosing
the haar wavelet in this work is due to its being required low computational cost, fast and each sub bands
(detail) contains a special edges type [22-26].
2.2.2. Applying DWT and find the features
Four sub-bands are generated after performing 2-D wavelet transform. the low-low sub-band denoted
(LL) containing the approximation of the enhanced input image, where the details of the same image in
different directions are contained on three sub-bands (high-pass) where (HL), (LH) and (HH) for horizantal,
vertical and diagonal direction respectively. Different block sizes are used in this work and three methods are
adopted in order to find the vector for the required features by using the (4-8) as shown in Figure 2.
𝐸𝑛𝑒𝑟𝑔𝑦 = ∑ ∑ 𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)2𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (4)
𝑝 𝐸 = 𝐸𝑛𝑒𝑟𝑔𝑦(𝐿𝐻) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐿) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐻) (5)
𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.5𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (6)
𝑃 𝑁 = 𝑁𝑜𝑟𝑚(𝐿𝐻) + 𝑁𝑜𝑟𝑚(𝐻𝐿) + 𝑁𝑜𝑟𝑚(𝐻𝐻) (7)
𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.75𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (8)
2.3. Matching phase
In this phase, generation of the template from training samples and feature matching are used to obtain
the similarity degree between the training samples and entered signatures. Numerical value is the output of
matching phase, so high result indicate that the signature sample belongs to the same signature. Normalized
mean square differences (NMSD) and normalized mean absolute difference (NMAD) are used to determine
the similarity degree.
2.3.1. Generation the template
In order to generate the template a number of signature are utilized for each individual as samples for
training. The template of an individual contains all features which extracted from all the training samples. For
each person a mean feature vector and concerning standard deviation are kept in data base. The following in
(9, 10) are used to calculate the mean and standard deviation.
𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜) =
1
𝑠
∑ 𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜)𝑠
𝑠 𝑛𝑜=1 (9)
𝜎(𝑝 𝑛𝑜, 𝑓𝑛𝑜) = √
1
𝑠
∑ (𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜) − 𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜))2𝑠
𝑠 𝑛𝑜=1 (10)
where 𝑝 𝑛𝑜 is a person number, 𝑠 𝑛𝑜 is a sample number and 𝑓𝑛𝑜 is a feature number, F acts the features vector
and 𝑠 represent the total number of samples.
5. TELKOMNIKA Telecommun Comput El Control
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2907
Figure 2. Methods of feature extraction
2.3.2. Features matching
For the purpose of features matching, statistical analysis is used. NMSD and NMAD are adopted to
discover the nearest stored match with the given entered signature. Consequently, the output of this stage is to
determine whether the signatures samples belong to the same signature or not, in (11, 12).
𝑁𝑀𝑆𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ (
𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜)
𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜)
)
2
(11)
𝑁𝑀𝐴𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ |
𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜)
𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜)
| (12)
3. RESULTS
The performance of the techniques used in this paper was evaluated and compared to other existing
techniques. Furthermore, the performance of the efficient technique for offline signature recognition was
evaluated in terms of its recognition and compared to other feature selection techniques. Three different sets
of features are utilized by partitioning the signature image into non overlapping blocks where different block
sizes are used. CEDAR signature database is used as a dataset for testing purpose. All the experiments and
the results achieved are presented in this section.
3.1. Performance analysis
The performance of the haar wavelet subbands and energy techniques and the feature extraction
techniques was analyzed. From CEDAR database [19] the dataset is utilized in the testing process. The dataset
is consisted of 55 persons and twelve signature samples for each person, each signature image is a .bmp file
type with 24 bit/pixel. Five features (LL, HL, LH, HH and power) are utilized by applying 1-level
decomposition of haar wavelet transform. 21*23 is selected as the size of block with the methods of matching
and for one set of features, results are described in Tables 1, 2 and 3.
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2908
Table 1. The rate of recognition using the energy with one set of features
Matching Methods LL LH HL HH Pow (PE)
NMAD 88.182 63.636 76.364 55.303 68.182
NMSD 97.727 90.606 93.788 81.970 90.000
Table 2. The rate of recognition using PN = 0.5 with one set of features
Matching Methods LL LH HL HH Pow (PN)
NMAD 67.424 43.788 50.000 39.697 45.000
NMSD 87.121 65.303 70.303 54.242 60.152
Table 3. The rate of recognition using PN = 0.75 with one set of features
Matching Methods LL LH HL HH Pow (PN)
NMAD 69.697 46.061 53.939 41.364 46.667
NMSD 89.394 68.788 74.242 56.364 64.697
Ten features (LL-LH, LL-HL, LL-HH, LL-pow, LH-HL, LH-HH, LH-pow, HL-HH, HL-pow and
HH-pow) are the results of combining the two features of haar wavelet transform (two sets of features).
The recognition rates are presented in Tables 4 showed the rate of recognition using the energy with two sets
of features, Table 5 showd the rate of recognition using PN = 0.5 with two sets of features 5 and 6 by using
the matching methods with block size equals to 21*23. Table 6 show the rate of recognition using PN = 0.75
with two sets of features
Table 4. The rate of recognition using the energy with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PE)
LH-HL LH-HH
LH-Pow
(PE)
HL-HH
HL-Pow
(PE)
HH-Pow
(PE)
NMAD 82.4242 88.1818 79.2424 81.6667 83.1818 66.0606 70.7576 69.6970 75.4545 61.9697
NMSD 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303
Table 5. The rate of recognition using PN = 0.5 with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PN)
LH-HL LH-HH
LH-Pow
(PN)
HL-HH
HL-Pow
(PN)
HH-Pow
(PN)
NMAD 57.7273 60.6061 53.4848 57.1212 50.7576 43.3333 45.7576 45.4545 47.2727 42.5758
NMSD 81.8182 83.3333 78.9394 79.6970 74.0909 63.3333 66.2121 64.8485 68.3333 57.4242
Table 6. The rate of recognition using PN = 0.75 with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PN)
LH-HL LH-HH
LH-Pow
(PN)
HL-HH
HL-Pow
(PN)
HH-Pow
(PN)
NMAD 61.0606 65.6061 56.9697 60.0000 55.4545 44.5455 47.4242 47.2727 50.4545 44.0909
NMSD 86.8182 86.9697 83.1818 84.6970 79.3939 68.0303 69.5455 70.3030 73.1818 61.2121
Also, ten features (LL-LH-HL, LL-LH-HH, LL_HL-HH, LL-LH-pow, LL-HL-pow, LL-HH-pow,
LH-HL-HH, LH-HL-pow, LH-HH-pow and HL-HH-pow) are the results of combining three features of haar
wavelet transform (three sets of features) and as previous step, by applying the matching methods with block
size equals to 21*23 the recognition rates are showed in Tables 7, 8 and 9. All the results above indicates
that the best results when using energy, so the Tables 10-12 are allocated to test different sizes for blocks
with energy. All the previous results recorded in the three tables showed that 21*23 is the best size to block.
Table 7. The rate of recognition using the energy with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PE)
LL-HL-
Pow (PE)
LL-HH-
Pow (PE)
LH-
HL-HH
LH-HL-
Pow (PE)
LH-HH-
Pow (PE)
HL-HH-
Pow (PE)
NMAD 86.364 77.576 82.576 80.000 83.939 76.364 75.000 78.030 67.273 69.545
NMSD 98.485 98.030 96.970 97.424 96.667 95.909 96.667 96.818 93.333 93.333
7. TELKOMNIKA Telecommun Comput El Control
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2909
Table 8. The rate of recognition using PN = 0.5 with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PN)
LL-HL-
Pow (PN)
LL-HH-
Pow (PN)
LH-
HL-HH
LH-HL-
Pow (PN)
LH-HH-
Pow (PN)
HL-HH-
Pow (PN)
NMAD 57.576 51.667 53.485 54.545 54.848 50.455 46.818 49.242 44.394 45.758
NMSD 81.212 76.970 78.333 77.879 79.091 75.152 69.545 71.515 63.939 64.091
Table 9. The rate of recognition using PN = 0.75 with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PN)
LL-HL-
Pow (PN)
LL-HH-
Pow (PN)
LH-
HL-HH
LH-HL-
Pow (PN)
LH-HH-
Pow (PN)
HL-HH-
Pow (PN)
NMAD 61.061 56.364 56.515 57.273 58.788 53.788 50.152 51.970 45.303 47.576
NMSD 85.758 80.606 83.030 81.818 83.636 78.939 75.152 75.606 68.182 69.091
Table 10. The rate of recognition of the one set of features with the energy
Block size LL LH HL HH Pow (PE)
Blk=5×7 73.9394 68.0303 74.5455 58.1818 67.4242
Blk=7×9 79.0909 72.4242 77.4242 61.6667 72.4242
Blk=9×11 85.3030 78.4848 80.3030 65.6061 76.9697
Blk=11×13 89.0909 82.1212 83.9394 68.4848 79.0909
Blk=13×15 92.1212 85.7576 87.2727 70.6061 81.6667
Blk=15×17 95.3030 88.7879 89.5455 74.5455 86.3636
Blk=17×19 95.3030 90.1515 90.7576 74.0909 83.6364
Blk=19×21 96.5152 93.6364 92.8788 82.4242 89.6970
Blk=21×23 97.7273 90.6061 93.7879 81.9697 90.0000
Table 11. The rate of recognition using two sets of features with the energy
Block size LL-LH LL-HL LL-HH
LL-Pow
(PE)
LH-HL LH-HH
LH-Pow
(PE)
HL-HH
HL-Pow
(PE)
HH-Pow
(PE)
Blk=5×7 77.1212 79.3939 71.8182 72.7273 82.2727 69.6970 73.4848 73.3333 74.8485 65.3030
Blk=7×9 82.5758 83.7879 76.0606 78.3333 86.9697 73.9394 78.3333 77.7273 79.8485 69.8485
Blk=9×11 87.8788 87.4242 82.8788 83.3333 89.3939 78.9394 83.0303 79.3939 81.9697 73.3333
Blk=11×13 91.6667 90.1515 85.9091 86.8182 91.2121 82.4242 85.0000 82.7273 85.6061 75.3030
Blk=13×15 94.3939 92.5758 90.0000 91.2121 94.6970 85.0000 88.9394 87.5758 89.2424 79.2424
Blk=15×17 95.9091 95.1515 93.6364 93.7879 95.9091 87.4242 91.0606 88.7879 91.5152 83.3333
Blk=17×19 96.3636 95.9091 93.3333 94.2424 95.9091 87.7273 90.3030 90.0000 91.0606 80.1515
Blk=19×21 97.7273 96.9697 95.9091 96.2121 97.4242 92.2727 93.7879 92.4242 93.4848 89.0909
Blk=21×23 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303
Table 12. The rate of recognition using three sets of features with the energy
Block size
LL-LH-
HL
LL-LH-
HH
LL-HL-
HH
LL-LH-
Pow (PE)
LL-HL-
Pow (PE)
LL-HH-
Pow (PE)
LH-HL-
HH
LH-HL-
Pow (PE)
LH-HH-
Pow (PE)
HL-HH-
Pow (PE)
Blk=5×7 82.4242 75.4545 78.3333 75.6061 77.7273 71.9697 79.6970 80.4545 71.9697 73.0303
Blk=7×9 86.3636 80.1515 82.1212 81.0606 82.4242 76.6667 82.8788 84.6970 76.5152 77.8788
Blk=9×11 89.8485 85.7576 84.8485 86.0606 86.0606 82.4242 86.8182 88.0303 81.0606 80.3030
Blk=11×13 91.5152 88.6364 88.3333 88.9394 88.7879 86.0606 89.2424 89.5455 83.3333 82.7273
Blk=13×15 94.3939 92.4242 91.5152 93.0303 91.5152 89.5455 92.2727 92.4242 86.3636 86.8182
Blk=15×17 96.2121 95.0000 94.2424 95.0000 94.2424 92.7273 93.9394 94.3939 88.7879 88.6364
Blk=17×19 96.9697 94.6970 94.6970 95.1515 94.5455 91.3636 94.0909 94.3939 88.4848 89.6970
Blk=19×21 98.0303 96.9697 96.8182 97.1212 96.5152 94.6970 96.2121 96.3636 91.9697 92.1212
Blk=21×23 98.4848 98.0303 96.9697 97.4242 96.6667 95.9091 96.6667 96.8182 93.3333 93.3333
4. CONCLUSION
Offline signature verification is a task that benefits from matching both the global shape and local
details an efficient technique for offline signature recognition depending on extracting the local feature by
utilizing the haar wavelet subbands and energy was introduced, it consists of three stages. In preprocessing
stage, the signature image was enhanced by applying many operations where the features were extracted by
utilizing the haar wavelet subbands with energy in feature extraction stage. NMSD and NMAD were used in
matching phase, the results indicated a high recognition rate (98.4848) when three sets of features were used
with block size equal to 21*23. The plans for feature include: using another partitioning method like Quadtree.
Using different types and shapes for signature.
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2910
ACKNOWLEDGMENT
The author’s thanks the "Department of Computer Science", "Collage of Science", "Mustansiriyah
University", for supporting this work.
REFERENCES
[1] B. M. Al-Maqaleh, A. M. Qaid Musleh “A Survey on Handwritten Signature Verification Approaches,”
Communications on Applied Electronics, vol. 4, no. 8, pp. 23-29, 2016.
[2] A. Sanmorino, S. Yazid, “A Survey for Handwritten Signature Verification,” International Conference on Uncertainty
Reasoning and Knowledge Engineering, IEEE, 2012.
[3] V. Malik, A. Arora, “Signature Recognition using Matlab,” International Journal for Research in Applied Science &
Engineering, vol. 3, no. VI, pp. 682-7, 2015.
[4] S. S. Muhamed, M. S. Al-Ani, “Signature Recognition based on Discrete Wavelet Transform,” UHD Journal of
Science and Technology, vol. 3, no. 1, pp. 19-29, 2019.
[5] P. Bhumika, S. Kumar “A Survey on Handwritten Signature Verification Techniques,” International Journal of
Advance Research in Computer Science and Management Studies, vol. 3, no. 1, 2015.
[6] H. Hiary, R. Alomari, T. Kobbaey, et al., “Off-Line Signature Verification System Based on DWT and Common
Features Extraction,” Journal of Theoretical and Applied Information Technology, vol. 51, no. 2, pp. 165-174, 2013.
[7] R. Doroz, M. Palys, T. Orczyk, H. Safaverdi, “Method of Signature Recognition with the Use of the Complex
Features,” Journal of Medical Informatics & Technologies, vol. 23, pp. 155-162, 2014.
[8] H. Hezil, R. Djemili, H. Bourouba, “Signature Recognition Using Binary Features and KNN,” International Journal
of Biometrics, vol. 10, no. 1, 2018.
[9] K. M. Aishwarya, Ajith Rao A. S., V. Singh, “A Comparative Study of Edge Detection in Noisy Images Using BM3D
Filter,” International Journal of Engineering Research & Technology, vol. 5, no. 9, pp. 142-147, 2016.
[10] M. Hasan, Mahmoud R. E-Sakka, “Improved BM3D Image Denoising Using SSIM-Optimized Wiener Filter,”
EURASIP Journal on Image and Video Processing, vol. 2018, no. 25, pp. 1-12, 2018.
[11] M. Lebrun, “An Analysis and Implementation of the BM3D Image Denoising Method,” Image Processing on Line,
vol. 2, pp. 175-213, 2012.
[12] A. Singh, S. Yadav, N. Singh, “Contrast Enhancement and Brightness Preservation Using Global-Local Image
Enhancement Techniques,” Fourth International Conference on Parallel, Distributed and Grid Computing, 2016.
[13] H. Michalak, K. Okarma, “Improvement of Image Binarization Methods Using Image Processing with Local Entropy
Filtering for Alphanumerical Character Recognition Purposes,” entropy, vol. 21, no. 6, pp. 1-18, 2019.
[14] Puneet, N. K. Garg, “Binarization Techniques used for Grey Scale Images,” International Journal of Computer
Application, vol. 71, no. 1, pp. 8-11, 2013.
[15] F. Haseena, R. Clara, “Performance Analysis of Iterative Thinning Methods Using Zhang Suen and Stentiford
Algorithm,” International Conference on Advancements in Computing Technologies, vol. 4, no. 2, 2018.
[16] D. Gupta, S. Choubey, “Discrete Wavelet Transform for Image Processing,” International Journal of Emerging
Technology and Advanced Engineering, vol. 4. no. 3, 2015.
[17] M. J. Gomez, C. Castejon, Juan C. Garcia, “Review of Recent Advances in the Application of the Wavelet Transform
to Diagnose Cracked Rotors,” Algorithms, vol. 9, no. 1, pp. 1-13, 2016.
[18] I. Sharif, S. Khare, “Comparative Analysis of Haar and Daubechies Wavelet for Hyper Spectral Image Classification” The
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. XL-8, 2014.
[19] FVC2004, “Fingerprint verification competition 2004,” 2004. [Online]. Available: http://bias.csr.unibo.it/fvc2004/
[20] Z. H. Salih, G. T. Hasan, and M. A. Mohammed, "Investigate and analyze the levels of electromagnetic radiations
emitted from underground power cables extended in modern cities," 2017 9th International Conference on
Electronics, Computers and Artificial Intelligence (ECAI), 2017.
[21] Z. H. Salih, G. T. Hasan, M. A. Mohammed, et al., "Study the Effect of Integrating the Solar Energy Source on
Stability of Electrical Distribution System," 2019 22nd International Conference on Control Systems and Computer
Science (CSCS), pp. 443-447, 2019.
[22] N. Q. Mohammed, M. S. Ahmed, M. A. Mohammed, et al., "Comparative Analysis between Solar and Wind Turbine
Energy Sources in IoT Based on Economical and Efficiency Considerations," 2019 22nd International Conference on
Control Systems and Computer Science (CSCS), pp. 448-452, 2019.
[23] M. A. Mohammed, I. A. Mohammed, R. A. Hasan, et al., "Green Energy Sources: Issues and Challenges," 2019 18th
RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1-8, 2019.
[24] N. D. Zaki, N. Y. Hashim, Y. M. Mohialden, M. A. Mohammed, T. Sutikno, and A. H. Ali, "A real-time big data
sentiment analysis for iraqi tweets using spark streaming," Bulletin of Electrical Engineering and Informatics, vol. 9,
no. 6, pp. 1411-1419, 2020.
[25] H. R. Ibraheem, Z. F. Hussain, S. M. Ali, M. Aljanabi, M. A. Mohammed, and T. Sutikno, "A new model for large
dataset dimensionality reduction based on teaching learning-based optimization and logistic regression,"
TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 18, no. 3, pp. 1688-194, 2020.
[26] O. A. Hammood, N. Nizam, M. Nafaa, and W. A. Hammood, "RESP: Relay Suitability-based Routing Protocol for
Video Streaming in Vehicular Ad Hoc Networks," International Journal of Computers, Communications & Control,
vol. 14, no. 1, pp. 21-38, 2019.