Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recognition and identity verification systems. Deep learning-based approaches have been shown through cross-sectional studies to improve recognition accuracy under diverse environmental and demographic conditions. Anti-counterfeiting (Anti-Spoofing) and real presence detection features integrated into systems have likewise enhanced system security against advanced attacks such as 3D masks, false images and videos, and Deepfake technology. Future trends point to the need to develop deep, multi-sensory and interpretable learning models, and adopt learning strategies based on limited data, while adhering to legal and ethical frameworks to ensure fairness andtransparency.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSummary
This research is included in the study of one of the most important rules of jurisprudence, which is (necessity descends the status of necessity, controls and applications) branching from the major rule (hardship brings facilitation) and since the jurisprudential rule is defined as knowledge of a total or majority rule that applies to all its parts. He has to know all the branches that fall under him, which leads to understanding Sharia, controlling jurisprudential issues and linking them to its rules, so that no contradiction occurs, and he has the jurisprudential faculty that he promotes in consideration and diligence. And what is meant by need: is what is lacking in terms of expansion and raising the distress that often lea
As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreIts well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.
Succinic acid is an essential base ingredient for manufacturing various industrial chemicals. Succinic acid has been acknowledged as one of the most significant bio based building block chemicals. Rapid demand for succinic acid has been noticed in the last 10 years. The production methods and mechanisms developed. Hence, these techniques and operations need to be revised. Recently, an omnibus rule for developing succinic acid is to find renewable carbohydrate Feedstocks. The sustainability of the resource is crucial to disintegrate the massive use of petroleum based-production. Accordingly, systematically reviewing the latest findings of bacterial production and related fermentation methods is critical. Therefore, this paper aims to stud
... Show MoreHeterogeneous photocatalysts was a promising material for removing organic pollutants. Titanium dioxide (TiO2) was a suitable photocatalyst for its cost efficiency and high stability to reduce various pollutants. Enhancing TiO2 photocatalyst performance by doping with changed metals or non-metal ions and organic compounds have been reviewed. These methods could enhance photoelectrochemical activity via: (i) by a donor of electrons via electron-donor agents that would produce particular defects in TiO2 structure and capture transporters of charge; (ii) by reducing recombination rate of the charge transporters and increasi
This study examined the tagged (the matter, its ruling, and examples of its applications in Ahmadiyya interpretations), the study of devising formulas of commissioning, especially the matter from the book of interpretation, which is: (Ahmadiyyeh’s interpretations), and the contemplative of the nature of (Ahmadiyya’s interpretations) realizes that the cognitive, linguistic and juristic knowledge product and the verses of judgments And other is the focus of this immortal travel, as it is truly a comprehensive book containing what the students of knowledge, scholars and the general public need in terms of interpreting the legal verses, and it is not possible to reach an understanding of the Book of God Almighty, and to clarify his purpo
... Show More