Preferred Language
Articles
/
ijs-10570
Face Recognition Using Stationary wavelet transform and Neural Network with Support Vector Machine
...Show More Authors

Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance of the system is better based on
the recognition rate measurement.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Thu Aug 15 2019
Journal Name
Selcuk Journal Of Agriculture And Food Sciences
The Effect of Knife Clearance on the Machine Performance in Disc Type Silage Machines
...Show More Authors

In this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Ieee Explorer
A Novel Flow Priority and Continuity Control Mechanism in SDN Network
...Show More Authors

In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p

... Show More
View Publication
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Two Machine Flow Shop Scheduling Problem to Minimize the Total Earliness
...Show More Authors

This paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
Crossref (4)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Cost Effective Open Educational Platform to Face the Challenge of Massification in Cadi Ayyad University
...Show More Authors

This work presents the UC@MOOC project as a pedagogical innovation to face the effects of massification that are making Moroccan universities endure many constraints for the past ten years, as well as other African universities. It aims, among its objectives, to cope with the massification factor and to overcome the language difficulties encountered by students. In this project, our top priority is to reduce academic failure then we will get to the point of responding to the training' needs. Courses are scripted and posted online which did not require many resources, so their production cost is relatively low. Audiovisual digital content also helps us to save time, and go to a hybrid teaching or even flipped classrooms in some cases. The

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (6)
Scopus Crossref
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Swelling Behavior and Drug Release of Interpenetrating Network Composed of PVA and Chitosan
...Show More Authors

     PVA and chitosan biodegradable, non-toxic, biocompatible polymers convenient for use in drug release.

In this study polyvinyl alcohol (PVA) and chitosan (CS) hydrogels crosslinked with glutaraldehyde (GA) with different ratio morphology and structure characterization interpenetrating polymer network (IPN).They were investigated by Fourier transmission infrared spectroscopy (FTIR), scanning electron microscope (SEM), UV-Visible spectrophotometer,swelling of hydrogel and drug release were studied by changing crosslinking ratio and PH.

 

View Publication Preview PDF
Crossref (2)
Crossref