In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe increase the rates of natural growth, urbanization and continuous migration, this has generated constant pressure and, as a result, the capital city of Baghdad faces a number of challenges related to its urban environment, including the challenge of acquiring real estate.
and this research examines the impact of these holdings, representing the main base from which the various projects originate Urban in all areas (economic, social, and recreational).
this leads us to the research problem of the obstacles that arise during the process of acquiring real estate to carry out development projects, and to achieve the objectives of research, namely (work to create a regulatory methodology
... Show Moreory and cytotoxic activities of M. peregrina seed ethanol extract (MPSE). Based on using gas chromatography-mass spectrometry analysis MPSE is rich in flavonoids, isothiocyanate, tocopherols, triterpenoids, and phenolics compounds. The immunomodulatory effect of MPSE was determined on whole blood and polymorphonuclear (PMNs) cells and macrophages. The in vitro antiproliferative effect was determined on the non-small-cell lung cancer, NCI-H460, cell line. Real-time quantitative PCR and flow cytometry were used to determine the expression of apoptotic genes in the MPSE-treated NCI-H460 cells. MPSE significantly (p < 0.001) suppressed whole blood, PMN cells and macrophage ROS production with IC50 values of 40.3 ± 0.3, 33.0 ± 0.6, and 26.1 ±
... Show Moreيعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد ال
... Show MoreTitle: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.
Researcher: Dr. Atallah Madb Hammadi Zubaie.
Bn the name of Allah Most Merciful
The interest in manuscripts and rules of their investigation and dissemination appeared soon, and the speech in editing terms and concepts appeared in sooner time. When looking at the classified books in the Arab manuscripts , we find the books of the first generation did not allude definition for this term , but rather focused on the importance of manuscripts and their existence locations, indexing, care, and verification rules. The reason for this is that the science of Arabic manuscrip
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More