A Proposed Speaker Recognition Method Based on Long-Term Voice Features and Fuzzy Logic
A Proposed Speaker Recognition Method Based on Long-Term Voice Features and Fuzzy Logic

Iman H. Hadi; Alia K. Abdul-Hassan

Volume 39, 1B , March 2021, Page 1-10

https://doi.org/10.30684/etj.v39i1B.343

Abstract
  Speaker recognition depends on specific predefined steps. The most important steps are feature extraction and features matching. In addition, the category of the speaker voice features ...  Read More ...
Eye Diseases Classification Using Back Propagation Artificial Neural Network
Eye Diseases Classification Using Back Propagation Artificial Neural Network

Hanaa M. Ahmed; Shrooq R. Hameed

Volume 39, 1B , March 2021, Page 11-20

https://doi.org/10.30684/etj.v39i1B.1363

Abstract
  A human eye is a vital organ responsible for a person's vision. So, the early detection of eye diseases is essential. The objective of this paper deals with diagnosing of seven different ...  Read More ...
Determination Efficient Classification Algorithm for Credit Card Owners: Comparative Study
Determination Efficient Classification Algorithm for Credit Card Owners: Comparative Study

Raghad A. Azeez

Volume 39, 1B , March 2021, Page 21-29

https://doi.org/10.30684/etj.v39i1B.1577

Abstract
  Today in the business world, significant loss can happen when the borrowers ignore paying their loans. Convenient credit-risk management represents a necessity for lending institutions. ...  Read More ...
Speaker Recognition Systems in the Last Decade – A Survey
Speaker Recognition Systems in the Last Decade – A Survey

Ahmed M. Ahmed; Aliaa K. Hassan

Volume 39, 1B , March 2021, Page 30-40

https://doi.org/10.30684/etj.v39i1B.1589

Abstract
  Speaker Recognition Defined by the process of recognizing a person by his\her voice through specific features that extract from his\her voice signal. An Automatic Speaker recognition ...  Read More ...
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments

Turkan A. Khaleel

Volume 39, 1B , March 2021, Page 41-52

https://doi.org/10.30684/etj.v39i1B.1675

Abstract
  The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed ...  Read More ...
Motion Estimation for Gray Level Videos Using Different Block Matching Algorithms
Motion Estimation for Gray Level Videos Using Different Block Matching Algorithms

Tareq Z. Hammood; Matheel E. Abdulmunim

Volume 39, 1B , March 2021, Page 53-66

https://doi.org/10.30684/etj.v39i1B.1684

Abstract
  Motion Estimation (ME) is a very important operation in video coding. In order to reduce complexity of computations involved in ME and to increase quality of this process, many Block ...  Read More ...
Using Texture Feature in Fruit Classification
Using Texture Feature in Fruit Classification

Mauj H. Abd al karim; Abdulamir A. Karim

Volume 39, 1B , March 2021, Page 67-79

https://doi.org/10.30684/etj.v39i1B.1741

Abstract
  Recent advances in computer vision have allowed wide-ranging applications in every area of life. One such area of application is the classification of fresh products, but the classification ...  Read More ...
Influence of Foaming Agent Type on The Behavior of Foamed Concrete
Influence of Foaming Agent Type on The Behavior of Foamed Concrete

Ruqaya F. Hamada; Awham M. Hameed

Volume 39, 1B , March 2021, Page 80-88

https://doi.org/10.30684/etj.v39i1B.1805

Abstract
  In this work the desired aim is to study the effect of two various sorts of a foaming agents on the properties of foamed concrete to obtain high quality with a target density is nearly ...  Read More ...
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy

Suhaila N. Mohammed; Alia K. Abdul Hassan

Volume 39, 1B , March 2021, Page 89-100

https://doi.org/10.30684/etj.v39i1B.1806

Abstract
  Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. ...  Read More ...
License Plate Tilt Correction: A Review
License Plate Tilt Correction: A Review

Nada N. Kamal; Enas Tariq

Volume 39, 1B , March 2021, Page 101-116

https://doi.org/10.30684/etj.v39i1B.1839

Abstract
  Tilt correction is an essential step in the license plate recognition system (LPR). The main goal of this article is to provide a review of the various methods that are presented in ...  Read More ...
A New Hybrid Technique for Face Identification Based on Facial Parts Moments Descriptors
A New Hybrid Technique for Face Identification Based on Facial Parts Moments Descriptors

Shaymaa M. Hamandi; Abdul Monem S. Rahma; Rehab F. Hassan

Volume 39, 1B , March 2021, Page 117-128

https://doi.org/10.30684/etj.v39i1B.1903

Abstract
  Robust facial feature extraction is an effective and important process for face recognition and identification system. The facial features should be invariant to scaling, translation, ...  Read More ...
Age Estimation in Short Speech Utterances Based on Bidirectional Gated-Recurrent Neural Networks
Age Estimation in Short Speech Utterances Based on Bidirectional Gated-Recurrent Neural Networks

Ameer A. Badr; Alia K. Abdul-Hassan

Volume 39, 1B , March 2021, Page 129-140

https://doi.org/10.30684/etj.v39i1B.1905

Abstract
  Recently, age estimates from speech have received growing interest as they are important for many applications like custom call routing, targeted marketing, or user-profiling. In this ...  Read More ...
Fracture Toughness of Glass infiltrated (3Y-TZP/Al2O3) Composite
Fracture Toughness of Glass infiltrated (3Y-TZP/Al2O3) Composite

Sara N. Ibrahim; Shihab A. Zaidan; Mudhafar A. Mohammed

Volume 39, 1B , March 2021, Page 141-149

https://doi.org/10.30684/etj.v39i1B.1919

Abstract
  Five different 3 mol.% yttria-tetragonal zirconia polycrystals/alumina (3Y-TZP/Al2O3) -glass specimens have been fabricated by the glass infiltration method. graphite additives were ...  Read More ...
A Study of the Effect of Starch Content on the Water Absorption of PVA/starch Blends
A Study of the Effect of Starch Content on the Water Absorption of PVA/starch Blends

Bushra H. Musa; Nahida J. Hameed

Volume 39, 1B , March 2021, Page 150-158

https://doi.org/10.30684/etj.v39i1B.1921

Abstract
  The present work aims to study physical tests such as the water absorption tests of PVA; PVA/corn starch blends at different mass percent (25, 30, 35, 40, and 50%) of corn starch after ...  Read More ...
Detection Face Parts in Image Using Neural Network Based on MATLAB
Detection Face Parts in Image Using Neural Network Based on MATLAB

Shahad L. Galib; Fouad S. Tahir; Asma A. Abdulrahman

Volume 39, 1B , March 2021, Page 159-164

https://doi.org/10.30684/etj.v39i1B.1944

Abstract
  Recently, face recognition system (FRS) is implemented in different applications including a range of vital services like airports and banking systems for security purposes. Therefore, ...  Read More ...
Survey of Recent Video Watermarking Techniques
Survey of Recent Video Watermarking Techniques

Taisir N. Hummadia; Nidaa F. Hassanb

Volume 39, 1B , March 2021, Page 165-174

https://doi.org/10.30684/etj.v39i1B.1950

Abstract
  With the development of the Internet coupled with expanding the accessibility of multimedia, various copyright issues have resulted. Several researchers have been working on watermarks ...  Read More ...
Intelligent Feature Selection Methods: A Survey
Intelligent Feature Selection Methods: A Survey

Noor Jameel; Hasanen S. Abdullah

Volume 39, 1B , March 2021, Page 175-183

https://doi.org/10.30684/etj.v39i1B.1623

Abstract
  Consider feature selection is the main in intelligent algorithms and machine learning to select the subset of data to help acquire the optimal solution. Feature selection used an extract ...  Read More ...
A Proposal Video Encryption Using Light Stream Algorithm
A Proposal Video Encryption Using Light Stream Algorithm

Ataa R. Alawi; Nidaa F. Hassan

Volume 39, 1B , March 2021, Page 184-196

https://doi.org/10.30684/etj.v39i1B.1689

Abstract
  Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography ...  Read More ...
Preparation ZnO nanoparticles with Different Concentration by Laser Ablation in Liquid
Preparation ZnO nanoparticles with Different Concentration by Laser Ablation in Liquid

Ghufran S. Jaber; Khawla S. Khashan; Maha J. Abbas

Volume 39, 1B , March 2021, Page 197-202

https://doi.org/10.30684/etj.v39i1B.1880

Abstract
  The effects of varying laser pulse numbers on the fabricated of ZnONPs by pulsed laser ablation in deionized water of Zn-metal are investigated. The Nd: YAG laser at energy 600mJ prepared ...  Read More ...
Data Center Enhancement by Server Resources Utilization
Data Center Enhancement by Server Resources Utilization

Haider A. Ghanem; Rana F. Ghani; Mohammed N. Fadhil

Volume 39, 1B , March 2021, Page 203-208

https://doi.org/10.30684/etj.v39i1B.174

Abstract
  Data centers are the main nerve of the Internet because of its hosting, storage, cloud computing and other services. All these services require a lot of work and resources, such as ...  Read More ...
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

Raya W. Abd Aljabar; Nidaa F. Hassan

Volume 39, 1B , March 2021, Page 209-221

https://doi.org/10.30684/etj.v39i1B.1755

Abstract
  Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, ...  Read More ...
Smart Door for Handicapped People via Face Recognition and Voice Command Technique
Smart Door for Handicapped People via Face Recognition and Voice Command Technique

Hanaa M. Salman; Rana T. Rasheed

Volume 39, 1B , March 2021, Page 222-230

https://doi.org/10.30684/etj.v39i1B.1719

Abstract
  Smart home indicates an application for different technological implementations, it could indicate any system which controls the door lock and several other devices. Facial identification ...  Read More ...
An Improved Method for Combine (LSB and MSB) Based on Color Image RGB
An Improved Method for Combine (LSB and MSB) Based on Color Image RGB

Sally A. Mahdi

Volume 39, 1B , March 2021, Page 231-242

https://doi.org/10.30684/etj.v39i1B.1574

Abstract
  Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least ...  Read More ...
Research Paper
A New Proposed Coding Method for Steganography Purpose
A New Proposed Coding Method for Steganography Purpose

Suhad M. Kadhem

Volume 39, 1B , March 2021, Page 243-251

https://doi.org/10.30684/etj.v39i1B.1510

Abstract
  Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission. ...  Read More ...
Research Paper
Effect of CO2 Laser on Glazed Zircon Surface Complemented by ZrO2 Oxide
Effect of CO2 Laser on Glazed Zircon Surface Complemented by ZrO2 Oxide

Zahraa A. Salman; Kadhim A. Hubeatir; Shihab A. Zaidan

Volume 39, 1B , March 2021, Page 252-261

https://doi.org/10.30684/etj.v39i1B.1552

Abstract
  In this paper, the effect of CO2 laser on glaze-dental Zirconia ceramics after adding ZrO2 nanoparticles to glaze is introduced, and its improvement methods are studied. Specimens ...  Read More ...