Omer MohammedSalih Hassan

Omer MohammedSalih Hassan
Duhok Polytechnic University | DPU · ADMINISTRATION COLLEGE/Information Technology Management

Master of Computer Engineering

About

13
Publications
4,545
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Additional affiliations
January 2018 - May 2019
Duhok Polytechnic University
Position
  • Managing Director
Education
March 2016 - September 2018
Siirt Üniversitesi
Field of study
  • Pattern Recognition and Machine learning

Publications

Publications (13)
Conference Paper
Full-text available
Abstract—This study describes a representation of gait appearance for the purpose of person identification and classification. The gait representation is based on wavelet 5/3 lifting scheme simple features such as features extracted from video silhouettes of human walking motion. Regardless of its effortlessness, this may lead us to say that, the r...
Article
Full-text available
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Article
Full-text available
Age estimation is a global challenge in the area of computer vision, as it depends on the facial features of the person. Recently, it has become an important approach for facial recognition problems and many other real-world applications. Accurate age estimation has the potential to improve decision-making processes in various industries and applic...
Conference Paper
Full-text available
Recently, the various diseases are infecting the humans due to their living environmental and the changes of the environmental. It is much important to identification and prediction of such diseases at earlier stagesv to prevent the outbreak these diseases. The identification of these diseases manually by the doctors is difficult. There are many of...
Conference Paper
Full-text available
Digital watermarking is getting more research and industry attention. Digital multimedia data allows for robust and simple data editing and modification. However, the spread of digital media presents concerns for digital content owners. It is important to note that digital data can be copied without quality or content loss. This has a considerable...
Article
Full-text available
Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. T...
Article
Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. T...
Article
Full-text available
Biometric authentication is one of the most quickly increasing innovations in today's world; this promising technology has seen widespread use in a variety of fields, including surveillance services, safe financial transfers, credit-card authentication. in biometric verification processes such as gender, age, ethnicity is iris recognition technolog...
Article
Full-text available
Internet use in the Kurdistan region of Iraq has grown dramatically and has become an essential element of our daily lives, with hundred ISPs on hand and constantly increasing number of users by using e-learning platforms. The need for feedback is deeply linked to student participation and peer evaluation. It is also an issue of evaluation quality;...

Questions

Questions (3)
Question
This question in wireless network (cellular network)
Q/ Prove that N = i 2 + ij + j2, where N is the cell cluster size, i is the number of cells to be traversed in the i coordinate, and j is the number of cells to be traversed in the j coordinate from the originating cell. The j coordinate is 60◦ from the i coordinate?
Question
I apply the lifting 5/3 GI with radon trasform and PCA I get a low accuracy how I can increase the accuracy.
Question
Wavelet transform use to human identification through walking style 

Network

Cited By