Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual information (MI), along with analysis of variance (ANOVA) for feature selection. Two iris classification systems were developed: one using LDA as an input for the OneR machine learning algorithm and another innovative hybrid model based on a One Dimensional Convolutional Neural Network (HM-1DCNN). The MMU database was employed, achieving a performance measure of 94.387% accuracy for the OneR model. Additionally, the HM-1DCNN model achieved 99.9% accuracy by integrating LDA with MI and ANOVA. Comparisons with previous studies show that the HM-1DCNN model performs exceptionally well, with at least 1.69% higher accuracy and lower processing time.
Solid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreA signature is a special identifier that confirms a person's identity and distinguishes him or her from others. The main goal of this paper is to present a deep study of the spatial density distribution method and the effect of a mass-based segmentation algorithm on its performance while it is being used to recognize handwritten signatures in an offline mode. The methodology of the algorithm is based on dividing the image of the signature into tiles that reflect the shape and geometry of the signature, and then extracting five spatial features from each of these tiles. Features include the mass of each tile, the relative mean, and the relative standard deviation for the vertical and horizontal projections of that tile. In the clas
... Show Moreone of the most important consequences of climate change is the rise in sea levels, which leads to the drowning of some low-lying island states, which leads to them losing the elements of statehood and thus affecting their status as a state, this resulted in several proposals made by the jurisprudence of international law to solve this issue, perhaps the most important of which is the idea of the government in exile, and the proposal to continue recognition of submerged countries, in a way that makes it possible to talk about a new concept of states represented by deterritorialized states, all of which are ultimately proposals that contain great difficulties that hinder their implementation in reality.
Deep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show MoreThe OSPF cost is proportionally indicated the transmitting packet overhead through a certain interface and inversely proportional to the interface bandwidth. Thus, this cost may minimized by direct packet transmitting to the other side via various probable paths simultaneously. Logically, the minimum weight path is the optimum path. This paper propose a novel Fuzzy Artificial Neural Network to create Smart Routing Protocol Algorithm. Consequently, the Fuzzy Artificial Neural Network Overlap has been reduced from (0.883 ms) to (0.602 ms) at fuzzy membership 1.5 to 4.5 respectively. This indicated the transmission time is two-fold faster than the standard overlapping time (1.3 ms).
The steady consumption of fish led many researchers to study it preferences over other foods, especially for radioactivity content. The specific activity concentration (S.A) of natural occurring radioactive materials (NORM) have been measured for Cyprinus carpio fishes collected from several industrial fishes' lakes located in Baghdad governorate using gamma spectroscopy doped with high purity germanium coaxial detector (HPGe). Thirteen fishes' samples were collected from industrial lakes, three samples were collected from cages, and two samples were collected from Trigger River. The last two types of samples were collected in order to compare the results with it. The measured overall averages of S.A for Ra-226, Th-232, and K-40 were 58.
... Show MoreThe main factors that make it possible to get the corrosion of reinforcing steel in concrete are chloride ions and the absorption of carbon dioxide from the environment, and each of them works with a mechanism which destroys the stable immunity of rebar in the concrete. In this work the effect of carbon dioxide content in the artificial concrete solution on the corrosion behavior of carbon steel reinforcing bar (CSRB) was studied, potentiostatically using CO2 stream gas at 6 level of concentrations; 0.03 to 2.0 weight percent, and the effect of rising electrolyte temperature was also followed in the range 20 to 50ᴼ C. Tafel plots and cyclic polarization procedures were obeyed to investigate the c
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreIn this paper, we propose a new approach of regularization for the left censored data (Tobit). Specifically, we propose a new Bayesian group Bridge for left-censored regression ( BGBRLC). We developed a new Bayesian hierarchical model and we suggest a new Gibbs sampler for posterior sampling. The results show that the new approach performs very well compared to some existing approaches.
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show More