Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance of the system is better based on
the recognition rate measurement.
Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreRecently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
The modified Hummers method was applied to prepare graphene oxide (GO) from the graphite powder. Tin oxide nanoparticles with different loading (10-20 wt.%) supported on reduced graphene oxide were synthesized to evaluate the oxidative desulfurization efficiency. The catalyst was synthesized by the incipient wetness impregnation (IWI) technique. Different analysis methods like FT-IR, XRD, FESEM, AFM, and Brunauer-Emmett-Teller (BET) were utilized to characterize graphene oxide and catalysts. The XRD analysis showed that the average crystal size of graphene oxide was 6.05 nm. In addition, the FESEM results showed high metal oxide dispersions on the rGO. The EDX analysis shows the weight ratio of Sn is close to its theoretical weight.
... Show MoreThe effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,
The effect of compound machine on wheat "Tamuz cultivar" was studied based on some technical indicators which were tested under three practical speed (PS) of 2.015, 3.143, and 4.216 km.hr-1 and three tillage depth (TD) of 11, 13, and 15cm. The split-split plot arrangement in RCBD with three replications was used. The results showed that the PS of 2.015km.hr-1 was major best than other two speed in all studied conditions, physical properties (SBD and TSP), mechanical parameters (FD, (DP and LAS), and yield and growth parameters (PVI, BY and HI). The TD of 11cm was major effect to the other two levels TD of 13 and TD of 15cm in all studied conditions. All interactions were significant,