Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this study, composite materials consisting of Activated Carbon (AC) and Zeolite were prepared for application in the removal of methylene blue and lead from an aqueous solution. The optimum synthesis method involves the use of metakaolinization and zeolitization, in the presence of activated carbon from kaolin, to form Zeolite. First, Kaolin was thermally activated into amorphous kaolin (metakaolinization); then the resultant metakaolin was attacked by alkaline, transforming it into crystalline zeolite (zeolitization). Using nitrogen adsorption and SEM techniques, the examination and characterization of composite materials confirmed the presence of a homogenous distribution of Zeolite throughout the activated carbon.
... Show MoreIn the present study, the growth and total lipid contents of two oleaginous fungal isolates Aspergillus terreus, Aspergillus fumigatus were compared in different nitrogen and organic carbon sources. Artificially the fungi were cultured on media consisting of various mono- or di- or polysaccharides and peptone or yeast extract as elementary sources for carbon and nitrogen, respectively. Media containing sucrose /yeast extract or glucose/ yeast extract were the most effective for lipid production from fungal, during two weeks incubation period, the highest biomass of dry weight was (19.6 , 18.8) g / L , (25.8 , 30.5) g /L and lipid yield (1, 0.97 )g/L, (0.65, 0.65) g/ L for two isolates Aspergillus terreus
... Show MoreAbstract This study investigated the treatment of textile wastewater contaminated with Acid Black 210 dye (AB210) using zinc oxide nanoparticles (ZnO NPs) through adsorption and photocatalytic techniques. ZnO NPs were synthesized using a green synthesis process involving eucalyptus leaves as reducing and capping agents. The synthesized ZnO NPs were characterized using UV-Vis spectroscopy, SEM, EDAX, XRD, BET, Zeta potential, and FTIR techniques. The BET analysis revealed a specific surface area and total pore volume of 26.318 m2/g. SEM images confirmed the crystalline and spherical nature of the particles, with a particle size of 73.4 nm. A photoreactor was designed to facilitate the photo-degradation process. The study investigated the inf
... Show MoreGender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More
