In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimensional Convolutional Neural Network Hybrid Model (1D-CNNHM). The MUCT database was considered for training and evaluation. The performance, in terms of classification, of the J48 model reached 96.01% accuracy whereas the DL model that merged LDA with MI and ANOVA reached 100% accuracy. Comparing the proposed models with other works reflects that they are performing very well, with high accuracy and low processing time.
Background Subtraction (BGS) is one of the main techniques used for moving object detection which further utilized in video analysis, especially in video surveillance systems. Practically, acquiring a robust background (reference) image is a real challenge due to the dynamic change in the scene. Hence, a key point to BGS is background modeling, in which a model is built and repeatedly used to reconstruct the background image.
From N frames the proposed method store N pixels at location(x,y) in a buffer, then it classify pixel intensity values at that buffer using a proposed online clustering model based on the idea of relative run length, the cluster center with the highest frequency will be adopted as the background pixel
... Show MoreThe aim of this paper is to determine the role of job engagement in the Iraqi Residency Affairs Directorate and its impact on employees, as the job engagement variable based on the Rich’s model included dimensions of cognitive engagement, emotional engagement and physical engagement. This variable has been studied in the Directorate of Residence Affairs which are one of the specialized directorates in the Iraqi Ministry of Interior. This study relied on a questionnaire as a main tool for measuring and collecting data based on the random sampling method . The sample size included 206 individuals among 400 individuals. However, the respondents were 190 whereas the final
... Show MoreRecently, new generalizations have been presented for the hyponormal operators, which are (N, k)-hyponormal operators and (h, M)-hyponormal operators. Some properties of these concepts have also been proved, one of these properties is that the product of two (N, k)-hyponormal operator is also (N, k)- hyponormal operator and the product of two (h, M)-hyponormal operators is (h, M)-hyponormal operator. In our research, we will reprove these properties by using the (l,m)-commuting operator equations, in addition to that we will solve the (l, m)-commuting operator equations for (N, k)-hyponormal operators and (h, M)-hyponormal operators.
This paper includes the estimation of the scale parameter of weighted Rayleigh distribution using well-known methods of estimation (classical and Bayesian). The proposed estimators were compared using Monte Carlo simulation based on mean squared error (MSE) criteria. Then, all the results of simulation and comparisons were demonstrated in tables.
In this study, we derived the estimation for Reliability of the Exponential distribution based on the Bayesian approach. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .We derived posterior distribution the parameter of the Exponential distribution under four types priors distributions for the scale parameter of the Exponential distribution is: Inverse Chi-square distribution, Inverted Gamma distribution, improper distribution, Non-informative distribution. And the estimators for Reliability is obtained using the two proposed loss function in this study which is based on the natural logarithm for Reliability function .We used simulation technique, to compare the
... Show MoreComputations of the relative permeability curves were made through their representation by two functions for wetting and nonwetting phases. Each function contains one parameter that controls the shape of the relative permeability curves. The values of these parameters are chosen to minimize an objective function, that is represented as a weighted sum of the squared differences between experimentally measured data and the corresponding data calculated by a mathematical model simulating the experiment. These data comprise the pressure drop across core samples and the recovery response of the displacing phase. Two mathematical models are constructed in this study to simulate incompressible, one-dimensional, two-phase flow. The first model d
... Show MoreIn the present paper, the authors introduce and investigates two new subclasses and, of the class k-fold bi-univalent functions in the open unit disk. The initial coefficients for all of the functions that belong to them were determined, as well as the coefficients for functions that belong to a field determining these coefficients requires a complicated process. The bounds for the initial coefficients and are contained among the remaining results in our analysis are obtained. In addition, some specific special improver results for the related classes are provided.
This research represents a reflection seismic study (structural and stratigraphic) for a (852) km2 area located in the south of Iraq within the administrative border of the province of Al-Muthanna and Qadisiyah province ,by using 2-D seismic data from Oil Exploration company three main seismic reflectors are picked, these are (Zubair and Yamama) Formations which they deposited during the Cretaceous age , and (Gotnia) Formation which deposited during Jurassic age .Structural maps of Formations are prepared to obtain the location and direction of the sedimentary basin and shoreline ,time, velocity and depth maps are drawn depending on the structural interpretation of the picked reflectors and show several structural feature as nose structu
... Show MoreThis research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show MoreThe Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m