User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
From 211 urine samples, Gram negative bacteria were isolated from only 61 urine samples with isolation percentage 28.9%. Escherichia coli were isolated percentage 70.49% while Klebsiella pneumoniae and Psendomonas aeruginosa were 8.19% and 6.55%, respectively.Proteus spp. Were isolated from 9 (14.75%), P. mirablis and P. vulgaris were isolates percentage 11.47% and 3.27%, respectively. Uroepithelial Cell Adhesin (UCA) fimbriae expression by P.mirabilis isolates was detected by the high capacity to adhesion to human uroepithetial cells, the isolate p.mirabilis U7 was adhesion to human uroepithelial cells mean no.30.2 bacteria/cell when grown on luria broth at 37C for 24h, but then grown it’s on luria agar at 37C for 24h the adhesion
... Show MoreIn this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) image
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreWater supply networks are marred by serious risks of imperceptible pipeline leakage, posing sustainability and performance threats. This article highlights the use of vibratory signal features to get around the drawbacks of traditional methods in a highly detailed framework for leak detection based on CatBoost. demonstrated excellent diagnostic performance and carried out a thorough test performance evaluation on five leakage configurations . The expected system achieved an accuracy of 98.1% (variance (well within x/3% of expected):, beating traditional competitors such as Random Forest (97.3%) and Support Vector Machine (93.8%). For example, the area under the receiver-operating characteristic curve was 0.995, in
... Show MoreFace recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima
... Show More