Preferred Language
Articles
/
joe-1815
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Virtual ( Electronic ) Reference Services In Academic Libraries: Virtual ( Electronic ) Reference Services In Academic Libraries
...Show More Authors

Abstract
This paper deals with the concept of electronic reference services in academic
libraries , showing forms of communications , training needs for reference librarians
and the role of the librarian in the new technological environment.

View Publication Preview PDF
Publication Date
Tue Sep 06 2022
Journal Name
International Journal Of Professional Business Review
The Relationship Between Audit Services and Non-Audit Actuarial Services in the Auditor’s Report
...Show More Authors

Purpose: In view of the trend toward using international financial reporting standards when generating financial statements, we looked at the interaction between audit services and non-audit services for auditors in the context of actuarial services for insurance firms. CPAs are authorized to work in banks and insurance businesses, but those with a practicing license obtained after earning a higher academic degree are not. Design/methodology/approach: A small number of auditing firms control the decisions issued by the Iraqi Accountants Association, monopolizing audit services in banks and insurance businesses. In the case of actuarial services used in reserve estimation, they are credited to an external party's account withou

... Show More
View Publication
Scopus (43)
Crossref (9)
Scopus Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimate the Parallel System Reliability in Stress-Strength Model Based on Exponentiated Inverted Weibull Distribution
...Show More Authors
Abstract<p>In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (<italic>R<sub>k</sub> </italic>) contain <italic>K<sup>th</sup> </italic> parallel components in the stress-strength model, when the stress and strength are independent and non-identically random variables and they follow two parameters Exponentiated Inverted Weibull Distribution (EIWD). Comparisons among the proposed estimators were presented depend on simulation established on mean squared error (MSE) criteria.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 12 2021
Journal Name
2021 International Conference On Electrical, Communication, And Computer Engineering (icecce)
Efficient Private Cloud Resources Platform
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Smartphone -Based Model for Human Activity Recognition
...Show More Authors

Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Disclosure of insurance services and its impact: On the performance of companies
...Show More Authors

The objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Survey of Face Recognition Systems
...Show More Authors

With the quick grow of multimedia contents, from among this content, face recognition has got a lot of significant, specifically in latest little years. The face as object formed of various recognition characteristics for detect; so, it is still the most challenge research domain for researchers in area of image processing and computer vision. In this survey article, tried to solve the most demanding facial features like illuminations, aging, pose variation, partial occlusion and facial expression. Therefore, it indispensable factors in the system of facial recognition when performed on facial pictures. This paper study the most advanced facial detection techniques too, approaches: Hidden Markov Models, Principal Component Analysis (PCA)

... Show More
View Publication Preview PDF
Crossref (3)
Crossref