Preferred Language
Articles
/
V0KP7psBMeyNPGM3IOKw
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recognition and identity verification systems. Deep learning-based approaches have been shown through cross-sectional studies to improve recognition accuracy under diverse environmental and demographic conditions. Anti-counterfeiting (Anti-Spoofing) and real presence detection features integrated into systems have likewise enhanced system security against advanced attacks such as 3D masks, false images and videos, and Deepfake technology. Future trends point to the need to develop deep, multi-sensory and interpretable learning models, and adopt learning strategies based on limited data, while adhering to legal and ethical frameworks to ensure fairness andtransparency.

Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (32)
Crossref (18)
Scopus Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An update on Nanoparticle Formulation Design of Piperine to Improve its Oral bioavailability: A Review
...Show More Authors

Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The typical path of compliance control in the verification of tax revenues
...Show More Authors

The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Search for Identity in Michael Ondaatje's Post colonial Novel In the Skin of a Lion
...Show More Authors

In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Iraqi Third Year College Students' Recognition of English Idioms: A Comparative Study
...Show More Authors

An idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.

View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Advances In Science And Technology Research Journal
Application of you only look once algorithms to crop production management using unmanned aerial vehicles and computer vision systems
...Show More Authors

Global date palm production is steadily increasing and adopting technologies such as unmanned aerial vehicles (UAVs) and deep learning can reduce costs, save time, and improve productivity. To address this issue, the authors have proposed an innovative approach that uses UAVs for high-resolution aerial imaging. These images, collected by the Department of Computer Engineering at Al-Salam University in Baghdad and the Institute of Machine Design, Faculty of Mechanical Engineering, Poznan University of Technology, support improved orchard management, palm counting, and yield estimation. Precise spraying and pollination are also facilitated and accelerated, reducing overall cultivation costs. The proposed methodology involves processing captur

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Morphological and Anatomical Review of Some Veronica Species from the Plantaginaceae Family
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon May 02 2022
Journal Name
International Journal Of Health Sciences
Gender identity rebellion in Virginia Woolf's
...Show More Authors

Great authors have a reputation for being reluctant political allies. They adamantly insist on focusing on aspects of life that no ideologist ever bothers to address. Life never exactly conforms to doctrine, and their art appears to defy ideology completely or subversively in order to find methods to break free from its shackles. Woolf's attitude toward feminism provides readers with an essential example of this resistance. Though Virginia Woolf was extremely concerned about the difficulties of women, particularly literary women, she often disliked being associated with feminists. Instead, she pushes for the transcendence of sexual roles, urging readers to go beyond gender to gain a better knowledge of human existence. Woolf's thesi

... Show More
View Publication
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Government slogans and the reflection of visual identity in their designs
...Show More Authors

There is no doubt that development is a human necessity and an urgent technical imperative that science imposes on all aspects of societal life. Especially in the field of graphic design, as logos are among the most prominent graphic achievements of an interactive nature with the requirements of the technical and functional era to serve the recipient and the continuity of interaction with him through a visual message sent to him constantly to remind him of what he interacted with in advance, which is known as visual identity, and during the process of developing logos especially And by providing designs that suit the contemporary technical and functional development, we often see the logo lose its visual identity. Therefore, the research

... Show More
View Publication Preview PDF
Crossref