Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security and then sent to the cloud server hosting the deep model. Upon reaching the server, the features are decrypted and fed into the proposed Fuzzy Face Deep Model (FFDM), which incorporates a fuzzy layer to enhance recognition accuracy. The model was evaluated using the MUCT and LFW datasets, demonstrating high accuracy and notable results, with precision of 99.65% and 100% on MUCT and LFW, respectively.
Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MoreObjective: The approximate life span of a silicone maxillofacial prosthesis is as short as1.5–2 years of clinical service, then a new prosthesis should be fabricated. The most common reasonfor re-making the prosthesis is silicone mechanical properties degradation. The aim of this studywas to assess some mechanical properties of VST-30 silicone for maxillofacial prostheses after addi-tion of intrinsic pigments.Methods: Two types of intrinsic pigments (rayon flocking and burnt sienna); each of them wasincorporated into silicone. One hundred and twenty samples were prepared and split into 4 groupsaccording to the conducted tests (tear strength, hardness, surface roughness, and tensile strengthand elongation percentage) with 30 samples for ea
... Show MoreThis study found that one of the constructive, necessary, beneficial, most effective, and cost-effective ways to meet the great challenge of rising energy prices is to develop and improve energy quality and efficiency. The process of improving the quality of energy and its means has been carried out in many buildings and around the world. It was found that the thermal insulation process in buildings and educational facilities has become the primary tool for improving energy efficiency, enabling us to improve and develop the internal thermal environment quality processes recommended for users (student - teacher). An excellent and essential empirical study has been conducted to calculate the fundamental values of the
... Show MoreLibraries, information centers, and everything related to organizing and preparing information need to be periodically re-evaluated in order to stand on the level of quality, which means improving the general reality of these institutions to ensure sufficient satisfaction from beneficiaries of the services provided. This is what was worked on in this research, as one of the most important quality standards in libraries and information centers, LibQUAL+®, was applied in one of the most important and oldest central university libraries, namely the Central Library of the University of Baghdad at its two locations, Al-Jadriya and Al-Waziriya. The sample of beneficiaries to whom the questionnaire was distributed reached 75 beneficiaries distrib
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .