Preferred Language
Articles
/
V0KP7psBMeyNPGM3IOKw
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recognition and identity verification systems. Deep learning-based approaches have been shown through cross-sectional studies to improve recognition accuracy under diverse environmental and demographic conditions. Anti-counterfeiting (Anti-Spoofing) and real presence detection features integrated into systems have likewise enhanced system security against advanced attacks such as 3D masks, false images and videos, and Deepfake technology. Future trends point to the need to develop deep, multi-sensory and interpretable learning models, and adopt learning strategies based on limited data, while adhering to legal and ethical frameworks to ensure fairness andtransparency.

Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
An optimized deep learning model for optical character recognition applications
...Show More Authors

The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (273)
Crossref (207)
Scopus Clarivate Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms based Path Planning for Mobile Robots
...Show More Authors

In general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot.  Simulation results, whi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 11 2025
Journal Name
Academic Science Journal
Review Article: Tumor Markers, Types and Clinical Applications
...Show More Authors

Over the past ten years, tumor markers have played an increasingly important role in clinicaloncology. This trend is expected to continue as technology advances and our knowledge of thehuman body and disease processes grows. In the treatment of cancer, tumor markers are widelyused for a variety of purposes, including screening, selecting a management strategy,determining the prognosis, and post-therapy follow-up. A comprehensive of the fundamentalsof pathophysiology and identification strategies for each specific malignancy is necessary fortheir prudent application in clinical practice. Oncology's use of cancer biomarkers hastransformed the way that cancer is treated, and led to notable improvements in patient outcomesand cancer tre

... Show More
View Publication
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 18 2026
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication