Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recognition and identity verification systems. Deep learning-based approaches have been shown through cross-sectional studies to improve recognition accuracy under diverse environmental and demographic conditions. Anti-counterfeiting (Anti-Spoofing) and real presence detection features integrated into systems have likewise enhanced system security against advanced attacks such as 3D masks, false images and videos, and Deepfake technology. Future trends point to the need to develop deep, multi-sensory and interpretable learning models, and adopt learning strategies based on limited data, while adhering to legal and ethical frameworks to ensure fairness andtransparency.
Background: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.
Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.
Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.
Result: Secondary scho
... Show MoreThe Geographic Information System (GIS) is considered one of the most prominent programs used to collect, analyze, display, process, and produce geographic information maps for a specific purpose. It is also considered one of the modern database programs. Additionally, we can perform statistical analysis within GIS on predefined data to produce quantitative results. In this study, data was collected from more than 80 engineering projects established in Baghdad City from soil investigation reports for the projects. Geographic information systems were used to produce objective maps showing the variation in the bearing capacity of shallow foundations in the soil of Baghdad Governorate. I
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThis study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MoreBackground: The occurrence of seizures in bacterial meningitis is important, as it has been reported to increase the risk of complications; however, its frequency and predictors are not well studied yet. Objective: To assess the frequency, clinical, and biochemical predictors of seizures in children with acute bacterial meningitis. Method: A cross-sectional study recruited confirmed acute bacterial meningitis cases based on positive CSF culture and sensitivity among children aged 2 months to 15 years admitted to the Central Child Teaching Hospital emergency department in Iraq. Patients were divided into two groups based on seizure at presentation time. Demographic characteristics [age, gender, residence, duration of fever and disease, prese
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [3-(3-acetylphenylamino)-5,5-dimethylcyclohex-3-enone][HL], from the reaction of dimedone with 3-amino acetophenone to produce the ligand [HL], the reaction was carried out in dry benzene as a solvent under reflux. The prepared ligand [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [HL] was used as a primary ligand while 8-hydroxy quinoline [HQ] was used as a secondary ligand with metal ion M(Π).Where M(Π) = (Mn ,Co ,Ni ,Cu ,Zn ,Cd and Pd) at reflux ,using ethanol as a solvent, KOH as a base. Complexes of the composition [M(L)(Q)] with (1
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [3-(3-acetylphenylamino)-5,5-dimethylcyclohex-3-enone][HL], from the reaction of dimedone with 3-amino acetophenone to produce the ligand [HL], the reaction was carried out in dry benzene as a solvent under reflux. The prepared ligand [HL] was characterized by FT-IR, UV-Vis spectroscopy, 'H, 8C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [HL] was used as a primary ligand while 8-hydroxy quinoline [HQ] was used as a secondary ligand with metal ion M(IT).Where M(IT) = (Mn ,Co ,Ni ,Cu ,Zn ,Cd and Pd) at reflux ,using ethanol as a solvent, KOH as a
... Show More