There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into the main sixteen blocks. Each block of these sixteen blocks is divided into more to thirty sub-blocks. For each sub-block, the SVD transformation is applied, and the norm of the diagonal matrix is calculated, which is used to create the 16x30 feature matrix. The sub-blocks of two images, (thirty elements in the main block) are compared with others using the Euclidean distance. The minimum value for each main block is selected to be one feature input to the neural network. Classification is implemented by a backpropagation neural network, where a 16-feature matrix is used as input to the neural network. The performance of the current proposal was up to 97% when using the FEI (Brazilian) database. Moreover, the performance of this study is promised when compared with recent state-of-the-art approaches and it solves some of the challenges such as illumination and facial expression.
Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreFingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show Moreيسعى المجتمع من خلال الوحدات الإقتصادية إلى الوصول إلى تحقيق أفضل الإنجازات التي لا تتمثل بالسلع والخدمات حسب وإنما بما يتحقق من مردود لكافة الاطراف المعنية بالوحدات الإقتصادية على ان لايتم ذلك على حساب قيم المجتمع وأخلاقياته وآدابه العامة. وعليه تصبح الوحدات الإقتصادية مسرحاً لصراعات قوى متعددة كل منها له قيمه الأخلاقية سواء كان فرداً أومجموعة افراد أو وحدة إقتصادية أو أي جهة أُخرى، وبحكم مسؤولياته
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe purpose of the study is to analyze the extent of the impact of liquidity as an independent variable on profitability as an intermediate variable and the value of banks listed in the Iraq Stock Exchange as a dependent variable, as the research problem is summarized by the fact that most banks focus on profitability as a phased goal without focusing on maximizing its value as a strategic goal by enhancing the wealth of owners and shareholders. On the long term, the research community is represented by the banks listed on the Iraq Stock Exchange, while the research sample was deliberately chosen, which included three private banks such as Baghdad Commercial Bank, the Iraqi Commercial Bank and the Iraqi Investment Bank, an
... Show MoreRecently, there has been a major trend towards environmental issues and concern for the green product because traditional products cause serious environmental impacts such as reduced resources, global warming, energy consumption, emissions and other environmental damage. Under these developments, economic units are looking for cost-effective technologies that reduce the cost of a green product that has four main dimensions: reducing energy, reducing resource consumption, preventing pollution, and using renewable energy while not compromising quality and satisfying customers in order to enhance competitive advantage.
This research will address one of the most important cost-effective green technologies, Gr
... Show More