In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimensional Convolutional Neural Network Hybrid Model (1D-CNNHM). The MUCT database was considered for training and evaluation. The performance, in terms of classification, of the J48 model reached 96.01% accuracy whereas the DL model that merged LDA with MI and ANOVA reached 100% accuracy. Comparing the proposed models with other works reflects that they are performing very well, with high accuracy and low processing time.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe research aims to identify the impact of the visual teaching strategy by using infographics mathematics achievement for intermediate grade students. The experimental research method was adopted, as the experimental design of two independent and equal groups with a post test was used, whereas the experiment was applied on a sample consisting of (52) male students from first- intermediate grade students in (Al-Haq Al-Mubin intermediate school for Boys) of the General Directorate in Anbar Governorate - Department Education in Fallujah for the academic year (2021-2022), and the research sample was distributed equally on the two research groups, and Division (B) was chosen randomly to be the experimental group, while Division (A) was the cont
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreReactive Powder Concrete (RPC) is one of the most advanced recent high compressive strength concrete. This work explored the effects of using glass waste as a fractional replacement for fine aggregate in reactive powder concrete at levels of 0%, 25%, 50%, and 100%. Linear and mass attenuation coefficients have been calculated as a function of the sample's thickness and bremsstrahlung energy. These coefficients were obtained using energy selective scintillation response to bremsstrahlung having an energy ranging from (0.1-1.1) MeV. In addition, the half-value thickness of the samples prepared has been investigated. It was found that there is a reversal association between the attenuation coefficient and the energy of the bremsstrahlu
... Show MoreBackground: Metabolic syndrome (MetS) is a collection of connected cardiovascular risk factors that characterizes the complicated illness. The waist circumference cutoff point fluctuation has so far defined Mets. Objective: This study aimed to determine the cutoff point for WC in healthy Iraqi adults. Methods: This cross-sectional survey establishes the standard value for WC among 300 healthy university students in Wasit city, Iraq. They are aged between 18-25 years. The receiver operator characteristic (ROC) curve was used WC to predict the presence of two or more risk factors for MetS, as defined by IDF. Results: The cutoff level yielding maximum sensitivity and specificity for predicting the presence of multiple risk factors was
... Show MoreConditional logistic regression is often used to study the relationship between event outcomes and specific prognostic factors in order to application of logistic regression and utilizing its predictive capabilities into environmental studies. This research seeks to demonstrate a novel approach of implementing conditional logistic regression in environmental research through inference methods predicated on longitudinal data. Thus, statistical analysis of longitudinal data requires methods that can properly take into account the interdependence within-subjects for the response measurements. If this correlation ignored then inferences such as statistical tests and confidence intervals can be invalid largely.
Myriophyllum spicatum distribution in Al-Burgga marsh, Hor Al-Hammar was described in relation to some of the physical-chemical properties for its habitat (water depth, light penetration, water temperature, water salinity, pH, dissolved oxygen, Ca+2, Mg+2, reactive NO2=, reactive NO3-1, and reactive PO4-3) during 2011, seasonally. CANOCO ordination program (CCA) was used to analyse the data. Its vegetation cover percentage was with its peak at summer, its value was 90 %, while the lowest value was 20 % in winter. Statistically, Positive relationships for WT, sal., Ca+2, Mg+2, reactive NO2=, reactive NO3-1, and reactive PO4-3 with the vegetation cover percentage were observed. While, negative relationships for WD, pH, and DO with the ve
... Show MoreGas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator
... Show More