Preferred Language
Articles
/
joe-1815
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
External Switching Dynamics of Optical Bistability System Simulation
...Show More Authors

In this work, the external switching dynamics of a Fabry-Perot etalon are studied via optical bistability system simulation. The simulated set-up of this investigation consists of two laser beams; the first beam is continuous (CW) which is considered as a biasing beam and capable of holding the bistable system for a certain range, which we are interested in, from a point that is very close self-switching to a point where the switching is unachievable. The second beam is modulated by passing the first beam through an acousto-optic modulator (AOM) to produce pulses with a minimum rise time and is used as an external source (coherent switching). In this work, we obtained the optical bistable loops by applying absorption coefficient (α) =

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The use of serum Amylase as a predictive factor for mortality in Perforated Duodenal Ulcer
...Show More Authors

serum amylase occurs in cases of perforated peptic ulcer partly as a result of increase leakage of pancreatic enzymes rich fluid from the perforation site with subsequent absorption by peritoneal lymphatics & partly due to damage of pancreases by digestive enzymes that spilled through the perforation.
Objectives: To determine the significance of abnormally high level of serum amylase in patients undergone operation for PDU, to study the factors that tend to bring about elevated serum amylase level in these patients.
Patients and Methods: A prospective study of 250 patients with perforated duodenal ulcer (PDU) at al kindy teaching hospital, Baghdad, Iraq from June 2008- august 2010. patients were examined clinically and investig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Function of Urban Space in strengthen social interaction through Time
...Show More Authors

problem of the research is the decline of the role of urban space with time as an influential system in societal relations. The research aims to define indicators for achieving social interaction in the city, and to determine indicators for achieving integration in the urban space, and to study the relationship between the integration of urban space and community interaction over time. the research assumed that by distinguishing the social interaction space from the urban space and developing urban spaces in order to be truly interactive spaces, this will help us achieve social interaction and build a positive relationship between them, which enables us to achieve integration within the urban spaces leading to social interaction. Because

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2005
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Hereditary Factor VII deficiency in 17 Iraqi patients
...Show More Authors

Background:

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of some mechanical properties of dental alginate impression materials after fluoride addition
...Show More Authors

Objective:Fluorid-containing dental alginate impression materials can exert a considerable reduction in
enamel solubility. The objective was to evaluate the effect of fluoride addition on the setting time and
compressive strength of alginate impression materials.
Methodology: 60 samples were constructed from alginate impression material (30 samples for setting
time test and 30 samples for compressive strength test).Specimens of each test divided into three
subgroup. Group A: 10 specimens of alginate were mixed with distilled water [control], Group B: 10
specimens of alginate were mixed with100-ppm fluoride and Group C:10 specimens of alginate were
mixed with 2%Naf.
Results: the result of setting time test showed t

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
A Comprehensive Study and Analysis of the Chaotic Chua Circuit
...Show More Authors

      was studied by taking several different values for the constant α and fixing the other three variables β, c and d with the values 25.58, -0.7142857, and -1.142, respectively. The purpose of this paper is to know the values by which the system transforms from a steady state to a chaotic state under the initial conditions x, y, and z that equal -1.6, 0 and 1.6 respectively. It was found that when the value of α is equal to 0, the Chua system is in a steady state, and when the value of α is equal to 9.5 and the wave is sinusoidal, the system is in oscillation, and when α is equal 13.4 the system is in a Quasi-chaotic state, and finally the system turns to the chaotic state when the value of α equals 15.0

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sat Nov 07 2020
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Identification and Discrimination of Mycobacterium tuberculosis Complex with Traditional and Real-Time PCR in Different Specimens in Iraq
...Show More Authors

Background: Tuberculosis (TB) is a major public health issue and a main cause of global morbidity and mortality. TB is the world's ninth leading cause of death despite the numerous treatment strategies for managing the disease.
Objective: To assess the traditional method (direct smear examination and culture) against real-time PCR as pulmonary and extrapulmonary tuberculosis laboratory diagnostic techniques.
Cases and methods: Samples were collected from (612) TB cases, (409) of whom were pulmonary tuberculosis (PTB) and (203) were extrapolmonary tuberculosis (EPTB). The cases were seeking care at the Specialized Chest and Respiratory Disease Center/ National Reference Laboratory for Tuberculosis (NRL) in Baghdad, during the period

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Fault Tolerance for Real Time Distributed System
...Show More Authors

This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.

Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.

View Publication Preview PDF