In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimensional Convolutional Neural Network Hybrid Model (1D-CNNHM). The MUCT database was considered for training and evaluation. The performance, in terms of classification, of the J48 model reached 96.01% accuracy whereas the DL model that merged LDA with MI and ANOVA reached 100% accuracy. Comparing the proposed models with other works reflects that they are performing very well, with high accuracy and low processing time.
A new application of a combined solvent extraction and two-phase biodegradation processes using two-liquid phase partitioning bioreactor (TLPPB) technique was proposed and developed to enhance the cleanup of high concentration of crude oil from aqueous phase using acclimated mixed culture in an anaerobic environment. Silicone oil was used as the organic extractive phase for being a water-immiscible, biocompatible and non-biodegradable. Acclimation, cell growth of mixed cultures, and biodegradation of crude oil in aqueous samples were experimentally studied at 30±2ºC. Anaerobic biodegradation of crude oil was examined at four different initial concentrations of crude oil including 500, 1000, 2000, and 5000 mg/L. Complete removal of crud
... Show MoreThis study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
The solution to the problems and challenges of the twenty-first century requires the absorption of many transformations, such as demographic change, poverty reduction, the expansion of safe and clean energy without affecting the environment, as well as reducing health risks and other transitions. It also requires greater cooperation than is possible in the current global system, because both of these constraints and challenges, even if addressed locally or nationally, are because of the potential for their transnational impact, that is, their impact on the lives of people at the global level, Which is necessary to be fully addressed unless it is guided by a comprehensive global vision. This is what environmental governance provides in te
... Show Moreتهدف الدراسة إلى استعراض ظهور كراسي اليونسكو في الجامعات العراقية والأنشطة التي تم تنفيذها لتحقيق أهداف التنمية المستدامة، حيث تم إنشاء كل كرسي لتحقيق أحد هذه الأهداف التي تركت أثرها على بعض القطاعات التعليمية والاجتماعية ، وبالتالي تنبع أهمية الدراسة من الحاجة إلى الإشارة إلى إنشاء كراسي اليونسكو في الجامعات العراقية والأنشطة التي عززت إنشائها ونشاطها ومبادراتها المحلية والدولية, وكذلك تحديد ما حقق
... Show MoreThe research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.
Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil and E. rothii Jan from Saffin mountain North of Arbil city North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.
Comparative morphological study has been treated for two species of the genus Chaenorhinum (D.C.) Richb., These species were: 1. Chaenorhinum calycinum 2. Chaenorhinum rubrifolium (Robill. & cast. Ex Lam. & DC.) Fourr. The genus belong to the family Scorphulariaceae. Morphological characters has been studies for: root, stem, leaves, flowers (calyx, corolla, androcium including filaments and anthers, gynocium including ovary, style and stigma), fruits and seeds also has been characterized. Key for there two species presented using some quantitative characters. Other characters like shape of fruits and seeds were used too, and they were of a useful taxonomic value
Comparative morphological study has been treated for two species of the genus Chaenorhinum (D.C.) Richb., These species were: 1. Chaenorhinum calycinum 2. Chaenorhinum rubrifolium (Robill. & cast. Ex Lam. & DC.) Fourr. The genus belong to the family Scorphulariaceae. Morphological characters has been studies for: root, stem, leaves, flowers (calyx, corolla, androcium including filaments and anthers, gynocium including ovary, style and stigma), fruits and seeds also has been characterized. Key for there two species presented using some quantitative characters. Other characters like shape of fruits and seeds were used too, and they were of a useful taxonomic value
This research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More