One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.
Abstract
This paper deals with the concept of electronic reference services in academic
libraries , showing forms of communications , training needs for reference librarians
and the role of the librarian in the new technological environment.
Purpose: In view of the trend toward using international financial reporting standards when generating financial statements, we looked at the interaction between audit services and non-audit services for auditors in the context of actuarial services for insurance firms. CPAs are authorized to work in banks and insurance businesses, but those with a practicing license obtained after earning a higher academic degree are not. Design/methodology/approach: A small number of auditing firms control the decisions issued by the Iraqi Accountants Association, monopolizing audit services in banks and insurance businesses. In the case of actuarial services used in reserve estimation, they are credited to an external party's account withou
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
The objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in
... Show MoreCodes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under de
... Show More
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob
... Show MoreLibraries, information centers, and everything related to organizing and preparing information need to be periodically re-evaluated in order to stand on the level of quality, which means improving the general reality of these institutions to ensure sufficient satisfaction from beneficiaries of the services provided. This is what was worked on in this research, as one of the most important quality standards in libraries and information centers, LibQUAL+®, was applied in one of the most important and oldest central university libraries, namely the Central Library of the University of Baghdad at its two locations, Al-Jadriya and Al-Waziriya. The sample of beneficiaries to whom the questionnaire was distributed reached 75 beneficiaries distrib
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreDatabase is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show More