Preferred Language
Articles
/
bsj-7243
Comparison of Faster R-CNN and YOLOv5 for Overlapping Objects Recognition
...Show More Authors

Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area.  The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and overlapping kitchen utensils from internet were used as base benchmark objects. The evaluation and training/validation sets are set at 20% and 80% respectively. This project evaluated the performance of these techniques and analyzed their strengths and speeds based on accuracy, precision and F1 score. The analysis results in this project concluded that the YOLOv5 produces accurate bounding boxes whereas the Faster R-CNN detects more objects. In an identical testing environment, YOLOv5 shows the better performance than Faster R-CNN algorithm. After running in the same environment, this project gained the accuracy of 0.8912(89.12%) for YOLOv5 and 0.8392 (83.92%) for Faster R-CNN, while the loss value was 0.1852 for YOLOv5 and 0.2166 for Faster R-CNN. The comparison of these two methods is most current and never been applied in overlapping objects, especially kitchen utensils.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Isolated Word Speech Recognition Using Mixed Transform
...Show More Authors

Methods of speech recognition have been the subject of several studies over the past decade. Speech recognition has been one of the most exciting areas of the signal processing. Mixed transform is a useful tool for speech signal processing; it is developed for its abilities of improvement in feature extraction. Speech recognition includes three important stages, preprocessing, feature extraction, and classification. Recognition accuracy is so affected by the features extraction stage; therefore different models of mixed transform for feature extraction were proposed. The properties of the recorded isolated word will be 1-D, which achieve the conversion of each 1-D word into a 2-D form. The second step of the word recognizer requires, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
جامعة بغداد مركز الدراسات الدولية
الحكم في أفغانستان بين المصالح و القانون الدولي الإنساني
...Show More Authors

كان لسياسات االحتالل دور بارز في فشل مشروع إعادة بناء الدولة في افغانستان، وفي الوقت نفسه تتحمل دول االحتالل المسؤ و لية الكاملة عن بعض هذه ً كبي ارً السياسات مثل عدم التخطيط الجيد لمرحلة االحتالل وإعادة بناء الدول ة، ثم إن جزءا من فشل هذه السياسات يرجع الى البيئتين المحلية واإلقليمية ، كذلك كان للخبرة السياسية والدستورية وللواقع االجتماعي الثقافي األفغاني تأثيرهما المهم في قدرة المجتمع األفغاني ً على قبول

... Show More
View Publication
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2006
Journal Name
Political Sciences Journal
الحقوق والحريات السياسية "دراسة مقارنة بين المواثيق الدولية والشريعة الاسلامية"
...Show More Authors

الحقوق والحريات السياسية " دراسة مقارنة بين المواثيق الدولية والشريعة الاسلامية"

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
النشاط الائتماني للمصرف الصناعي العراقي مقارنة بين نشاطيه التخصصي والشامل
...Show More Authors

         يواجه المصرف تحولات عديدة أثناء سير عمله ولا سيما قد تحول من مصرف صناعي يسعى الى تحقيق التنمية الصناعية ، من خلال منحه قروض وتسهيلات تنموية وتدعمه الدوله ، الى مصرف شامل يسعى الى تحقيق الربحية في ظل تنويع الأنشطة والخدمات والعمليات الائتمانية.يهدف البحث الى دراسة التحولات التي حدثت في المصرف الصناعي، وتأثير هذا التحول على النشاط الائتماني. وقد استند في ذلك على فرضية رئيسة وهي :-

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Comparison of some reliability estimation methods for Laplace distribution using simulations
...Show More Authors

In this paper, we derived an estimator of reliability function for Laplace distribution with two parameters using Bayes method with square error loss function, Jeffery’s formula and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived Bayesian estimator compared to the maximum likelihood of this function and moment method using simulation technique by Monte Carlo method under different Laplace distribution parameters and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator and moment estimator in all samples sizes

Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (50)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
مجلة الدنانير
قياس مستوى إدارة المعرفة و التوجه نحو الزبون و تنافسية منظمات الأعمال كميا : دراسة مقارنة في شركتي أربيل ستيل و Gk ستيل (1)‎
...Show More Authors

ب