AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The main aim of this paper is innovation in eye recognition phase. In this paper, a new and fast method is proposed for human eye recognition that can quickly specify the human eye location in an input image. In the proposed method, eyes will be specified in an input image with a CNN neural network. This proposed method is tested on different images and provided highest accuracy for the image recognition which used in security systems.
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show More
Toxic substances have been released into water supplies in recent decades because of fast industrialization and population growth. Fenton electrochemical process has been addressed to treat wastewater which is very popular because of its high efficiency and straightforward design. One of the advanced oxidation processes (AOPs) is electro-Fenton (EF) process, and electrode material significantly affects its performance. Nickel foam was chosen as the source of electro-generated hydrogen peroxide (H2O2) due to its good characteristics. In the present study, the main goals were to explore the effects of operation parameters (FeSO4 concentration, current density, and electrolysis time) on the catalytic performance that was optimized by r
... Show MoreAn integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically proce
... Show MoreThe bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.