Preferred Language
Articles
/
_ReCWZIBVTCNdQwCXaxM
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.

Crossref
View Publication
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Field Observation of Soil Displacements Resulting Due Unsupported Excavation and Its Effects on Proposed Adjacent Piles
...Show More Authors

Soil movement resulting due unsupported excavation nearby axially loaded piles imposes significant structural troubles on geotechnical engineers especially for piles that are not designed to account for loss of lateral confinement. In this study the field excavation works of 7.0 m deep open tunnel was continuously followed up by the authors. The work is related to the project of developing the Army canal in the east of Baghdad city in Iraq. A number of selected points around the field excavation are installed on the ground surface at different horizontal distance. The elevation and coordinates of points are recorded during 23 days with excavation progress period. The field excavation process was numerically simulated by using the finite

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Designing activity based costing systems ABC for transport services and its role in improving the efficiency of pricing decisions: بحث تطبيقي في الشركة العامة لادارة النقل الخاص
...Show More Authors

  The research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Food Chemistry
Development of cellulose Nanofiber-based substrates for rapid detection of ferbam in kale by Surface-enhanced Raman spectroscopy
...Show More Authors

View Publication
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of a teaching program based on the McCarthy Model (4MAT) in developing creative writing skills and reflective thinking among university students
...Show More Authors

The aim of this study was to determine the effect on using the McCarthy Model (4MAT) for developing creative writing skills and reflective thinking among undergraduate students. The quasi-experimental approach was adopted. And, in order to achieve the study objective, the educational content of Teaching Ethics (Approach 401), for the plan for the primary grades teacher preparation program  was dealt with by using a teaching program based on the McCarthy Model (4MAT) was used.

The study which was done had been based on the academic achievement test for creative writing skills, and the reflective thinking test. The validity and reliability of the study tools were also confirmed. The study was applied to a sample consisting of

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the Current Financial Crisis : Causes and Solutions (Iraqi crisis a model , based on the public budget for the fiscal year 2016)
...Show More Authors

The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o

... Show More
View Publication Preview PDF
Crossref