Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for 3d-reconstruction

Article
The Effect of Using Projective Cameras on View- Independent Gait Recognition Performance

Fatimah S. Abdulsattar

Pages: 22-29

PDF Full Text
Abstract

Gait as a biometric can be used to identify subjects at a distance and thus it receives great attention from the research community for security and surveillance applications. One of the challenges that affects gait recognition performance is view variation. Much work has been done to tackle this challenge. However, the majority of the work assumes that gait silhouettes are captured by affine cameras where only the height of silhouettes changes and the difference in viewing angle of silhouettes in one gait cycle is relatively small. In this paper, we analyze the variation in gait recognition performance when using silhouettes from projective cameras and from affine cameras with different distance from the center of a walking path. This is done by using 3D models of walking people in the gallery set and 2D gait silhouettes from independent (single) cameras in the probe set. Different factors that affect matching 3D human models with 2D gait silhouettes from single cameras for view-independent gait recognition are analyzed. In all experiments, we use 258 multi-view sequences belong to 46 subjects from Multi-View Soton gait dataset. We evaluate the matching performance for 12 different views using Gait Energy Image (GEI) as gait features. Then, we analyze the effect of using different camera configurations for 3D model reconstruction, the GEI from cameras with different settings, the upper and lower body parts for recognition and different GEI resolutions. The results illustrate that low recognition performance is achieved when using gait silhouettes from affine cameras while lower recognition performance is obtained when using gait silhouettes from projective cameras.

Article
Optimal Selection of Conductors in Ghaleganj Radial Distribution Systems

Mahdi Mozaffarilegha, Ehsan Moghbeli Damaneh

Pages: 212-218

PDF Full Text
Abstract

Selection of the best type and most suitable size of conductors is essential for designing and optimizing the distribution network. In this paper, an effective method has been proposed for proper selection and incorporation of conductors in the feed part of a radial electricity distribution network considering the depreciation effect of conductors. Increasing the usability of the electric energy of the power grid for the subscribers has been considered per load increment regarding the development of the country. Optimal selection and reconstruction of conductors in the power distribution radio network have been performed through a smart method for minimizing the costs related to annual losses and investment for renovation of lines by imperialist competitive algorithm (ICA) to improve the productivity of the power distribution network. Backward/forward sweep load flow method has been used to solve the load flow problem in the power distribution networks. The mentioned optimization method has been tested on DAZ feeder in Ghaleganj town as test.

Article
Image Hiding Using Variable Length Least Significant Bits Embedding

Abbas A. Jasim

Pages: 15-0

PDF Full Text
Abstract

In this work a new hiding system is proposed. It is based on Least Significant Bits (LSB) embedding of secrete image into another cover image. The proposed hiding algorithm embeds the secrete image bits in the least significant bits of the cover image pixels such that the number of secrete image bits that are embedded in least significant bits of cover image pixel is variable and determined randomly. Such cover image pixel may contain no secrete information bit, one bit, two bits , or three bits according to the pseudo random number generator that generates integer numbers randomly between 0 and 3. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret information. It ensures that the eavedroppers will not have any suspicion that message bits are hidden in the image. The proposed system achieves perfect reconstruction of the secret message.

Article
Gray Scale Image Hiding Using Wavelet Packet Transform

Abbas A. Jasim

Pages: 51-59

PDF Full Text
Abstract

This work implying the design of hiding system that hides a gray scale image into another gray scale image using two-dimensional wavelet packet transform. The proposed hiding scheme uses Wavelet Packet Transform (WPT) to embed data elements of the secret image in different frequency bands of the cover image. The data elements of the secrete image are placed within DWT subspaces after simple treatment in order to reduce its significance on the resulting image and to increase security. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret image. The proposed system achieves perfect reconstruction of the secret image. All programs in this work is written by MATLAB 7.

Article
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption

Abbas A. Jasim, Hiba Hakim

Pages: 42-48

PDF Full Text
Abstract

In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation method. A new non linear stream cipher algorithm is also proposed that is based on combining several keys generated by Linear Feedback Shift Register (LFSR). The results shown that the proposed algorithm has a high security feature and it is efficient for image encryption. Practical tests proved that the proposed encryption algorithm is robust, provides high level of security and gives perfect reconstruction of the decrypted image.

1 - 5 of 5 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.