Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recognition and identity verification systems. Deep learning-based approaches have been shown through cross-sectional studies to improve recognition accuracy under diverse environmental and demographic conditions. Anti-counterfeiting (Anti-Spoofing) and real presence detection features integrated into systems have likewise enhanced system security against advanced attacks such as 3D masks, false images and videos, and Deepfake technology. Future trends point to the need to develop deep, multi-sensory and interpretable learning models, and adopt learning strategies based on limited data, while adhering to legal and ethical frameworks to ensure fairness andtransparency.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex.
Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different
... Show MoreThe research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability
... Show MoreIn his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ
An idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.
Global date palm production is steadily increasing and adopting technologies such as unmanned aerial vehicles (UAVs) and deep learning can reduce costs, save time, and improve productivity. To address this issue, the authors have proposed an innovative approach that uses UAVs for high-resolution aerial imaging. These images, collected by the Department of Computer Engineering at Al-Salam University in Baghdad and the Institute of Machine Design, Faculty of Mechanical Engineering, Poznan University of Technology, support improved orchard management, palm counting, and yield estimation. Precise spraying and pollination are also facilitated and accelerated, reducing overall cultivation costs. The proposed methodology involves processing captur
... Show MoreGreat authors have a reputation for being reluctant political allies. They adamantly insist on focusing on aspects of life that no ideologist ever bothers to address. Life never exactly conforms to doctrine, and their art appears to defy ideology completely or subversively in order to find methods to break free from its shackles. Woolf's attitude toward feminism provides readers with an essential example of this resistance. Though Virginia Woolf was extremely concerned about the difficulties of women, particularly literary women, she often disliked being associated with feminists. Instead, she pushes for the transcendence of sexual roles, urging readers to go beyond gender to gain a better knowledge of human existence. Woolf's thesi
... Show MoreThere is no doubt that development is a human necessity and an urgent technical imperative that science imposes on all aspects of societal life. Especially in the field of graphic design, as logos are among the most prominent graphic achievements of an interactive nature with the requirements of the technical and functional era to serve the recipient and the continuity of interaction with him through a visual message sent to him constantly to remind him of what he interacted with in advance, which is known as visual identity, and during the process of developing logos especially And by providing designs that suit the contemporary technical and functional development, we often see the logo lose its visual identity. Therefore, the research
... Show More