In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimensional Convolutional Neural Network Hybrid Model (1D-CNNHM). The MUCT database was considered for training and evaluation. The performance, in terms of classification, of the J48 model reached 96.01% accuracy whereas the DL model that merged LDA with MI and ANOVA reached 100% accuracy. Comparing the proposed models with other works reflects that they are performing very well, with high accuracy and low processing time.
Abstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin
... Show Moreis at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show MoreThe research aims to show the relationship between artificial intelligence in accounting education and its role in achieving sustainable development goals in the Kingdom of Bahrain. The research dealt with the role of artificial intelligence applications in accounting education at the University of Applied Sciences as a model for Bahraini universities to achieve sustainable development goals. The application of artificial intelligence in accounting education achieves seven of the seventeen sustainable development goals. It also concludes that there is an artificial intelligence infrastructure in the Kingdom of Bahrain, as it occupies a leading regional position in digital transformation, as Bahrain ranks first in the Arab world i
... Show MoreThe research topic was chosen as a result of the importance of human resource in business organizations in general and the industrial process in particular. Without the human resource, business organizations cannot continue and achieve success and excellence, and the research problem has been diagnosed in the lack of sales of General Cement Company’s northern products, despite their distinctiveness, standing, and reputation in The market and its products with standard specifications, and through this problem, the following questions were raised: &nbs
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show More<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c
... Show MoreThe objective of the research is to uncover the effect of the strategy of Quranic verses in the collection of science and systemic intelligence for second-grade students. The research sample consisted of (48) students of second grade students in the middle of Al Rasheed Boys School of the second Karkh Directorate, Distribution in the two divisions, Division of (b) and experimental group that studied strategy of Quranic verses, and the Division (a) control group which studied the regular way, and results indicated a statistically significant differences for the experimental group students studied using the strategy Verses in systemic intelligence collection.