In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials. Good agreement between the average theoretical and measured cooli
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Ficus (FIC) leaf extract used as corrosion inhibitor for carbon steel alloy (C.S) in two corrosive environments (saline and acidic) with four concentrations (1, 2, 3 and 4 ppm) at varied temperature range between (298-328 K) using electrochemical polarization measurements. The importance of this work focused on the use the green chemistry that is far from the chemical materials effect. The results of polarization presented the FIC inhibitor consider a mixed type (anodic and cathodic) inhibitor. Tafel curve used to evaluate the corrosion inhibition activity. In a saline medium, the best inhibitor efficiency reaches to (87%) in 2 ppm and IE% reach to (99%) for HCl medium inhibited by 1ppm. Langmuir isotherm obeys the study by thermodynamic pa
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIl semble que Khattabi était un linguiste, avec un endroit linguistique pour comprendre les textes de conversations et des mots étranges en particulier. Langue, et chacun avait ses arguments et ses preuves. Ses corrections incluaient la mélodie dans les mouvements, telle qu'une dilution plus serrée, la dilution de l'agitateur, le remplacement d'un autre mouvement, ou une autre rotation des mouvements, et le changement de structure morphologique du mot qui en résultait, ainsi que l'alerte sur les conséquences des lettres, Certaines de ces erreurs sont dues à la langue, et certaines sont considérées comme un type de déformation ou de fausse représentation connue de certains spécialistes, ce qui constitue un précédent louable
... Show More