Preferred Language
Articles
/
9BcjUo8BVTCNdQwCv2t_
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimensional Convolutional Neural Network Hybrid Model (1D-CNNHM). The MUCT database was considered for training and evaluation. The performance, in terms of classification, of the J48 model reached 96.01% accuracy whereas the DL model that merged LDA with MI and ANOVA reached 100% accuracy. Comparing the proposed models with other works reflects that they are performing very well, with high accuracy and low processing time.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Conference Proceedings
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus (20)
Scopus
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Thu Jan 10 2019
Journal Name
Journal Of The College Of Education For Women
Personal intelligence relationship with the management agliation among teachers
...Show More Authors

       Personal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.

      Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .  

  • the study aims

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Iraqi Postgraduate Medical Journal
7 SMAS Plasty in Face Lift with Fat Graft: Evaluation of Aesthetic Outcomes
...Show More Authors

ABSTRACT: BACKGROUND: The main goal of facelift surgery is to reduce the effect of aging by reposition of face soft tissue in to more youthful orientation. There are many methods for SMAS plication which had different design and vector of pull. AIM OF STUDY: To evaluate the effectiveness and longitivity of 7 shaped SMAS plication in facelift. PATIENT AND METHODS: From January 2020 to march 2021, 10 female patients with age (45-60) years were presented with facial sagging, those patients were subjected to subcutaneous facelift with 7 shaped SMAS plication with fat greft in Al-Shaheed Ghazi Al-Harri Hospital and Baghdad burn medical center at Baghdad medical complex. RESULTS: The average follow up period was 6 to 12 months. The mean operative

... Show More
Publication Date
Sat Feb 10 2024
Journal Name
International Development Planning Review
THE IMPACT OF COMPETITIVE SPEED EXERCISES ON JUNIOR BOXERS' EFFECTIVENESS OF SKILL PERFORMANCE AND COUNTERATTACK SPEED
...Show More Authors

The competitive environment influences the increase in exercise intensity and hence adds to the growth of training and practice. The study objective.to identify the effect of competitive speed exercises on the effectiveness of skill performance and speed of counterattack for junior boxers, as well as to know the rate of development for these variables.Materials and methods. The research sample consisted of twelve up-and-coming Al-Najda Sports Club players who participated in the national tournament and were selected with care. They were placed into two groups, control and experimental, with six boxers each in the control and experimental groups. The two groups were assigned identical weights on purpose, and their ages range from 15 to 16 ye

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Proposed Hybrid Sparse Adaptive Algorithms for System Identification
...Show More Authors

Abstract 

For sparse system identification,recent suggested algorithms are  -norm Least Mean Square (  -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named  -ZA-LMS, 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 29 2014
Journal Name
Information And Knowledge Management
Applying Electronic Commerce for a Proposed Virtual Organization
...Show More Authors

Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per

... Show More
Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors