The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Convolutional Neural Network (CNN) has been chosen as a better option for the training process because it produces a high accuracy. The final accuracy has reached 91.18% in five different classes. The results are discussed in terms of the probability of accuracy for each class in the image classification in percentage. Cats class got 99.6 %, while houses class got 100 %.Other types of classes were with an average score of 90 % and above.
Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreDifferent parameters of double pipe helical coil were investigation experimentally. Four coils were used; three with a curvature ratio (0.037, 0.031, and 0.028) and 11mm diameter of the inner tube while the fourth with 0.033 curvature ratio and 13 mm diameter of the inner tube. The hot water flow in the inner tube whereas the cold water flows in the annulus. The inlet temperatures of hot and cold water are 50 0C and 18 0C respectively. The inner mass flow rate ranges from 0.0167 to 0.0583 kg/s. The results show the Nusselt number increase with increase curvature ratio. The Nusselt number of the coil with 0.037 curvature ratio increases by approximately 12.3 % as compare with 0.028 curvature ratio. The results also r
... Show MoreObjectives This work presents laser coating of grade 1 pure titanium (Ti) dental implant surface with sintered biological apatite beta-tricalcium phosphate (β-TCP), which has a chemical composition close to bone. Materials and methods Pulsed Nd:YAG laser of single pulse capability up to 70 J/10 ms and pulse peak power of 8 kW was used to implement the task. Laser pulse peak power, pulse duration, repetition rate and scanning speed were modulated to achieve the most homogenous, cohesive and highly adherent coat layer. Scanning electron microscopy (SEM), energy dispersive X-ray microscopy (EDX), optical microscopy and nanoindentation analyses were conducted to characterise and evaluate the microstructure, phases, modulus of elasticity
... Show MoreThe study aimed at identifying the mental capacity of the research sample and classifying them for the purposes of the study, preparing the scale of cognitive control of the subject of teaching methods of sports education, preparing educational units by establishing the question network for the subject of the teaching methods of sports education, and adopting the experimental method by experimental design workers (2×2) for the two groups The limits of the research community are represented by third-stage students of the Department of Physical Education and Sports Science in the morning study of the College of Knowledge, the Community University, which continues in the regular working hours of the year (2019-2020) adult Their number
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn order to advance the education process and raise the educational level of the players, it became necessary to introduce new educational aids, programmed education in the education process, through which the basic skills to be learned are explained and clarified, and immediate feedback is provided that would enhance the information of the learner, and Reaching the goal to be achieved, taking into account the individual differences between the players, and thus it is possible to move away from the educational methods used in learning skills, which requires great effort and time, in addition to that the open playground may not perform the skill accurately and the player looks from one side, while when using the computer you look from severa
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show More'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal