Israa M. Hayder

Israa M. Hayder
Southern Technical University -Iraq | STU · Qurna Technical Institute (QTI)

MSc.

About

11
Publications
1,306
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11
Citations
Citations since 2016
10 Research Items
11 Citations
201620172018201920202021202201234
201620172018201920202021202201234
201620172018201920202021202201234
201620172018201920202021202201234

Publications

Publications (11)
Article
The purpose of this study is to identify the use of the Internet by Iraqi university students for preliminary studies، as well as the nature of the relationship between the students and their use of the Internet. Achieving the objectives of the study A questionnaire was designed to study the field of the study problem for testing and finding optima...
Chapter
Full-text available
This paper which entitles “Electronic Open Dissemination Framework in Electronic Government” may be a web based on online application expecting for citizen. The most destinations of this application are to create it intuitively and makes facilities to the client for tackling every day issues. Citizens can utilize this framework to rummage around fo...
Conference Paper
The strength of the encryption system depends on the power of the key generator that produces a pseudorandom stream. The generator generates a pseudorandom sequence so passes several tests. The non-linear flow coding system that relies on the Adder function has several unwanted vulnerabilities. It leads to failure to face randomness tests and relat...
Article
In this paper, implementation of stream cipher algorithm based on nonlinear combination generator for any given sequences is introduced. The main contribution of this work is to enhance the security of this generator and level of complexity is added using logic functions. The proposed scheme was measured through a series of randomness tests.
Article
In order to insert the data through the text, image or audio, the data hiding process can be used. Where the audio and text will be embedded into the color image. Third Least-Significant-Bit (LSB 3) will be used here, rather than utilizing Least-Significant-Bit (LSB 1) of the cover for embedding the information which help to improve the reliability...
Article
Full-text available
The aim of the research is to improve the distorted digital images using one of the methods of frequency domain. Where The Transform Cosine Discrete (DCT) function was used as one methods of frequency domain. Good results have been obtained using this method. standard gray scale images, which have distortions, have been improved and get improved im...
Article
Full-text available
This paper presents a brief evaluation and discussion of five reconfigurable/ultra-wideband (UWB) antenna configurations that are used for cognitive radio (CR) applications. The ultrawideband antenna is used as a sensing service while the reconfigurable antenna is used for communications. Comparison among different switching techniques is also disc...
Article
Full-text available
The nations of the world today are measured by their scientific potentials in the extent to which they use the modern technologies and possibilities in the information and communication sector to constantly progress, that reflected as electronic government, communication networks, computer control, etc. As these possibilities and advantages, it is...
Conference Paper
The rapid development of information and network technologies, networks already become an important part of peoples' live. People not only can get more information by net, but also can find new ways to live and new business work. For example, network bank, online chat, net-shopping, … etc. Along with the new things' appearance, the problem of infor...

Network

Cited By

Projects

Projects (2)
Project
Abstract Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this paper is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia, extract all the details after optimization with the fingers of someone else's imprint. In this paper, program is coded by MATLAB. For the program, some optimization at coding level and algorithm level are proposed to improve the performance of my fingerprint recognition system. These performance enhancements are shown by experiments conducted upon a variety of fingerprint images. Also, the experiments illustrate the key issues of fingerprint recognition that are consistent with what the available literatures say. Keyword: Fingerprint Recognition, valleys, ridges, Enhancement, Binarization and Segmentation