Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ola N. Kadhim"'
Autor:
Ola N. Kadhim
Publikováno v:
Wasit Journal for Pure Sciences, Vol 2, Iss 3 (2023)
Face recognition is a biometric technology that involves identifying and verifying individuals based on their facial features. It finds applications in security, surveillance, and user authentication systems. The extraction of facial image features a
Externí odkaz:
https://doaj.org/article/26618f22754f4e32a94c50f091c5308f
Publikováno v:
Iraqi Journal of Science. :1963-1974
Coronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable
Autor:
Kifah T. Khudhair, Ola N. Kadhim, Fallah H. Najjar, Firas Abedi, Ali N. Jamaluddin, Ibrahim H. Al-Kharsan
Publikováno v:
2022 5th International Conference on Engineering Technology and its Applications (IICETA).
Autor:
Fallah H. Najjar, Kifah T. Khudhair, Ali Hussein Abdul Khaleq, Ola N. Kadhim, Firas Abedi, Ibrahim H. Al-Kharsan
Publikováno v:
2022 5th International Conference on Engineering Technology and its Applications (IICETA).
In this search, an important methodology has been presented for communicated information rectification utilizing advanced channel windowing approach. The modern data communication technologies are ensured with numerous challenges because of their unp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::be1e4b8be064ae55f9db7535d599ae94
https://zenodo.org/record/7118077
https://zenodo.org/record/7118077
Autor:
Zahir M. Hussain, Ola N. Kadhim
Publikováno v:
Journal of Computer Science. 14:1247-1266
In this study, two techniques are introduced for imagesteganography in the spatial domain. These systems employ chaos theory to trackthe addresses of shuffled bits in steganography. The first system is based onthe well-known LSB technique, while the
Publikováno v:
Journal of Physics: Conference Series. 1530:012080
Bézier curve of the first rank is a simple equation in terms of form, but it is characterized by the nature of private transactions making it difficult to use in image encryption because the dispersion of color values is not enough, this results in