There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into the main sixteen blocks. Each block of these sixteen blocks is divided into more to thirty sub-blocks. For each sub-block, the SVD transformation is applied, and the norm of the diagonal matrix is calculated, which is used to create the 16x30 feature matrix. The sub-blocks of two images, (thirty elements in the main block) are compared with others using the Euclidean distance. The minimum value for each main block is selected to be one feature input to the neural network. Classification is implemented by a backpropagation neural network, where a 16-feature matrix is used as input to the neural network. The performance of the current proposal was up to 97% when using the FEI (Brazilian) database. Moreover, the performance of this study is promised when compared with recent state-of-the-art approaches and it solves some of the challenges such as illumination and facial expression.
The research aims to achieve a set of objectives, the most important of which is to educate the management of companies operating in the private sector about the advantages and risks of using creative accounting practices, as on the one hand they serve the interests of the company and improve its image, and on the other hand it exposes it to the risks of non-compliance with tax laws and legislation or the risks of default and bankruptcy as a result of exploiting gaps and flexibility in the application Accounting standards, and in line with the objectives and through the research problem that was formulated in the form of a question (Are their creative accounting practices that are reflected in the honesty and fairness of financia
... Show MoreThe current research deals with the dialectical relationship resulting from the conflict in the violent combination and construction of the living ( the actor)and the dead (the item) in the structure of the Sinography construction and the emergence of the theatrical play space , which can be summed up by the following question: what is the nature of the dialectical relationship between the living (the actor) and the dead( the item) in the Sinography creation, which limited the research in a central objective : to identify the controversy of the living (actor) and the dead (item) in the performance unit of the theatrical scene . The research, in its objective limits set forth in its methodological framework, analyzes this controversy in o
... Show More
This research aims to apply the Performance Focused Activity Based Costing System in the offices of scientific and advisory services at the University of Technology for the purpose of measuring the cost of services provided by these offices in order to reduce costs. To test the hypothesis of the research, the research was applied in the consulting offices of the University of Technology through the financial statements for the year ending 12/31/2017 of the Scientific and Consulting Services Office of the University of Technology, because the data of these years were issued and audited by the Federal Office of Financial Supervision.
A number of
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreIn this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi
... Show MoreThis study aimed to detect of contamination of milk and local soft cheese with Staphylococcus aureus and their enterotoxins with attempt to detect the enterotoxin genes in some isolates of this bacteria. A total of 120 samples, 76 of raw milk and 44 of soft cheese were collected from different markets of Baghdad city. Enterotoxins in these samples were detected by VIDAS Set 2 system and it was found that enterotoxin A is present in a rate of 44.74% in milk samples and in a rate 54.50% in cheese samples. While other enterotoxins B, C, D, E were not found in any rate in any samples.
Through the study 60 isolates obtained from milk and cheeses were identified as Staphylococcus aureus by cultural, morphological and biochemical test by u
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More