Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a recognition rate of 97.75% in the presence of facial expression, lighting and pose variations. Results are compared with its wavelet-based counterpart where it obtained a recognition rate of 10.4%. The proposed multiwavenet demonstrated very good recognition rate in the presence of variations in facial expression, lighting and pose and outperformed its wavelet-based counterpart.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MorePrediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreIn this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adsor
... Show MorePetrophysical characterization is the most important stage in reservoir management. The main purpose of this study is to evaluate reservoir properties and lithological identification of Nahr Umar Formation in Nasiriya oil field. The available well logs are (sonic, density, neutron, gamma-ray, SP, and resistivity logs). The petrophysical parameters such as the volume of clay, porosity, permeability, water saturation, were computed and interpreted using IP4.4 software. The lithology prediction of Nahr Umar formation was carried out by sonic -density cross plot technique. Nahr Umar Formation was divided into five units based on well logs interpretation and petrophysical Analysis: Nu-1 to Nu-5. The formation lithology is mainly
... Show MoreThe Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show MoreThe dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreWhen optimizing the performance of neural network-based chatbots, determining the optimizer is one of the most important aspects. Optimizers primarily control the adjustment of model parameters such as weight and bias to minimize a loss function during training. Adaptive optimizers such as ADAM have become a standard choice and are widely used for their invariant parameter updates' magnitudes concerning gradient scale variations, but often pose generalization problems. Alternatively, Stochastic Gradient Descent (SGD) with Momentum and the extension of ADAM, the ADAMW, offers several advantages. This study aims to compare and examine the effects of these optimizers on the chatbot CST dataset. The effectiveness of each optimizer is evaluat
... Show More