In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show Morethis paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
The theatre costume with the rest of the theatre show elements constitute a system of the meaning relations that produce a visual image that helps the recipient to decipher the theatre scene, let alone the manifestation of time in its levels (past, present, future) through the design construction of the theatre elements among which is the theatre costume. In order to know the way of manifesting time through the formulation of the theatre costumes, the research question has been put as follows: how to manifest time through the design construction for the theatre costumes unit, from which the research objective is derived as follows: Revealing the possibility of the designing unit of the costumes in manifesting the levels of time wit
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe study aims to indicate the role of the agricultural initiative in building agricultural development, mediated by activation of the role of internal and external audit on agricultural initiative projects, for the purpose of meeting the challenges of abuses on agricultural land and lack of water used in agriculture and proportions of high poverty, which led to the rural people of the migration to the city and leave agriculture and livestock, and that of the main conclusions reached by the researcher. When comparing the work of the external auditing agencies (the Federal Office of Financial Supervision) on the initiative of agricultural projects with internal audit services in the Directorate of Agriculture and branches of the Agricultu
... Show MorePolycrystalline Indium oxide (In2O3) and Indium oxide-zinc oxide (IZO) thin films mixed with 10% ZnO content were prepared by spray-pyrolysis technique at relatively low substrate temperature (150 ˚C).Field emission scanning electron microscope (FE-SEM) shows that the nanostructure at 10% ZnO content has pyramid like structure. The hall effect measurements show that the prepared samples have n-type charge carriers .The films were examined as gas sensor against H2S gas at different operating temperatures (200, 250 and 300) oC, and it was found that the IZO sample a good sensitivity to H2S gas ~ 572 % at operating temperature 200 oC, with relatively fast response time of 19 s and recovery time of 17
... Show MorePt (IV) complexes were synthesized from 4-Aminoantipyrine (4-AAP) as a primary ligand, and sodium pyrophosphate as a secondary ligand using metal: ligand in (1:1) mole ratio with molecular formula [Pt (4-AAP)Cl4],[Pt (4-AAP)(Pyph)Cl2]. These complexes were characterized by elemental microanalysis (C.H.N), (A.A), [I.R, (U.V–Vis), mass spectroscopy], along with molar conductivity, chloride contents and melting point measurements. The ligands (4-AAP) and (Pyph) gave octahedral geometry with Pt (IV) rapid, simple, sensitive and validated spectrophotometric method has been described for the determination of platinum (IV) using 4-aminoantipyrine. The complex product was quantitatively measured at 385nm and the reaction conditions were studie
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreIn this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was
... Show More