In this study, an end-to-end human iris recognition system is presented to automatically identify individuals for high level of security purposes. The deep learning technology based new 2D convolutional neural network (CNN) model is introduced for extracting the features and classifying the iris patterns. Firstly, the iris dataset is collected, preprocessed and augmented. The dataset are expanded and enhanced using data augmentation, histogram equalization (HE) and contrast-limited adaptive histogram equalization (CLAHE) techniques. Secondly, the features of the iris patterns were extracted and classified using CNN. The structure of CNN comprises of convolutional layers and ReLu layers for extracting the features, pooling layers for reducing the parameters, fully connected layer and Softmax layer for classifying the extracted features into N classes. For the training process and updating the weights, the backpropagation algorithm and adaptive moment estimation Adam optimizer are used. The experimental results carried out based on a graphics processing unit (GPU) and using Matlab. The overall training accuracy of the introduced system was 95.33% with a consumption time of 17.59 minutes for training set. While the testing accuracy 100% with a consumption time of 12 seconds. The introduced iris recognition system has been successfully applied.
A hybrid approach for face recognition using a convolutional neural network c...IAESIJAI
Facial recognition technology has been used in many fields such as security,
biometric identification, robotics, video surveillance, health, and commerce
due to its ease of implementation and minimal data processing time.
However, this technology is influenced by the presence of variations such as
pose, lighting, or occlusion. In this paper, we propose a new approach to
improve the accuracy rate of face recognition in the presence of variation or
occlusion, by combining feature extraction with a histogram of oriented
gradient (HOG), scale invariant feature transform (SIFT), Gabor, and the
Canny contour detector techniques, as well as a convolutional neural
network (CNN) architecture, tested with several combinations of the
activation function used (Softmax and Segmoïd) and the optimization
algorithm used during training (adam, Adamax, RMSprop, and stochastic
gradient descent (SGD)). For this, a preprocessing was performed on two
databases of our database of faces (ORL) and Sheffield faces used, then we
perform a feature extraction operation with the mentioned techniques and
then pass them to our used CNN architecture. The results of our simulations
show a high performance of the SIFT+CNN combination, in the case of the
presence of variations with an accuracy rate up to 100%.
Real-time eyeglass detection using transfer learning for non-standard facial...IJECEIAES
The aim of this paper is to build a real-time eyeglass detection framework based on deep features present in facial or ocular images, which serve as a prime factor in forensics analysis, authentication systems and many more. Generally, eyeglass detection methods were executed using cleaned and fine-tuned facial datasets; it resulted in a well-developed model, but the slightest deviation could affect the performance of the model giving poor results on real-time non-standard facial images. Therefore, a robust model is introduced which is trained on custom non-standard facial data. An Inception V3 architecture based pre-trained convolutional neural network (CNN) is used and fine-tuned using model hyper-parameters to achieve a high accuracy and good precision on non-standard facial images in real-time. This resulted in an accuracy score of about 99.2% and 99.9% for training and testing datasets respectively in less amount of time thereby showing the robustness of the model in all conditions.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A hybrid approach for face recognition using a convolutional neural network c...IAESIJAI
Facial recognition technology has been used in many fields such as security,
biometric identification, robotics, video surveillance, health, and commerce
due to its ease of implementation and minimal data processing time.
However, this technology is influenced by the presence of variations such as
pose, lighting, or occlusion. In this paper, we propose a new approach to
improve the accuracy rate of face recognition in the presence of variation or
occlusion, by combining feature extraction with a histogram of oriented
gradient (HOG), scale invariant feature transform (SIFT), Gabor, and the
Canny contour detector techniques, as well as a convolutional neural
network (CNN) architecture, tested with several combinations of the
activation function used (Softmax and Segmoïd) and the optimization
algorithm used during training (adam, Adamax, RMSprop, and stochastic
gradient descent (SGD)). For this, a preprocessing was performed on two
databases of our database of faces (ORL) and Sheffield faces used, then we
perform a feature extraction operation with the mentioned techniques and
then pass them to our used CNN architecture. The results of our simulations
show a high performance of the SIFT+CNN combination, in the case of the
presence of variations with an accuracy rate up to 100%.
Real-time eyeglass detection using transfer learning for non-standard facial...IJECEIAES
The aim of this paper is to build a real-time eyeglass detection framework based on deep features present in facial or ocular images, which serve as a prime factor in forensics analysis, authentication systems and many more. Generally, eyeglass detection methods were executed using cleaned and fine-tuned facial datasets; it resulted in a well-developed model, but the slightest deviation could affect the performance of the model giving poor results on real-time non-standard facial images. Therefore, a robust model is introduced which is trained on custom non-standard facial data. An Inception V3 architecture based pre-trained convolutional neural network (CNN) is used and fine-tuned using model hyper-parameters to achieve a high accuracy and good precision on non-standard facial images in real-time. This resulted in an accuracy score of about 99.2% and 99.9% for training and testing datasets respectively in less amount of time thereby showing the robustness of the model in all conditions.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize
persons with a high degree of assurance. Extracting effective features is the most important stage in the
iris recognition system. Different features have been used to perform iris recognition system. A lot of
them are based on hand-crafted features designed by biometrics experts. According to the achievement of
deep learning in object recognition problems, the features learned by the Convolutional Neural Network
(CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed
an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The
proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for
features extracting and classification. The performance of the iris recognition system is tested on four
public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The
results show that the proposed system is achieved a very high accuracy rate.
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
This project investigates the use of face recognition for a surveillance system. The normal video surveillance system uses in closed-circuit television (CCTV) to record video for security purpose. It is used to identify the identity of a person through their appearances on the recorded video, manually. Today’s video surveillance camera system usually not occupied with a face recognition system. With some modification, a surveillance camera system can be used as face detection and recognition that can be done in real-time. The proposed system makes use of surveillance camera system that can identify the identity of a person automatically by using face recognition of Haar cascade classifier. The hardware used for this project were Raspberry Pi as a processor and Pi Camera as a camera module. The development of this project consist of three main phases which were data gathering, training recognizer, and face recognition process. All three phases have been executed using Python programming and OpenCV library, which have been performed in a Raspbian operation system. From the result, the proposed system successfully displays the output result of human face recognition, with facial angle within ±40°, in medium and normal light condition, and within a distance of 0.4 to 1.2 meter. Targeted image are allowed to wear face accessory as long as not covering the face structure. In conclusion, this system considered, can reduce the cost of manpower in order to identify the identity of a person in real time situation.
Dorsal hand vein authentication system using artificial neural networknooriasukmaningtyas
Biometric feature authentication technology had been developed and implemented for the security access system. However, the known biometric features such as fingerprint, face and iris pattern failed to provide ideal security. Dorsal hand vein is the features beneath the skin which makes it not easily be duplicated and forged. It was expected to be used in biometric authentication technology to achieve an ideal accuracy with the uniqueness of its characteristics. In this study, 240 images of 80 users were obtained from Bosphorus Hand Vein Database. The images were then pre-processed by cropping ROI, mean filtering, CLAHE enhancing and histogram equalizing. The ROI was then segmented by implementing binarization. The local binary pattern (LBP) features were then extracted from the binarized image. The extracted features were sent to an artificial neural network (ANN) for the classification of the images. The training result shows that the LBP features and ANN can recognize the dorsal hand vein pattern quite well with 90% recognition rate. The NN net was then utilized in the MATLAB GUI program for testing 100 images (80 trained images of 80 users and 20 untrained images of 20 users) from the Bosphorus Hand Vein Database. The results revealed 100% accuracy in their matching result.
Content-based image retrieval based on corel dataset using deep learningIAESIJAI
A popular technique for retrieving images from huge and unlabeled image databases are content-based-image-retrieval (CBIR). However, the traditional information retrieval techniques do not satisfy users in terms of time consumption and accuracy. Additionally, the number of images accessible to users are growing due to web development and transmission networks. As the result, huge digital image creation occurs in many places. Therefore, quick access to these huge image databases and retrieving images like a query image from these huge image collections provides significant challenges and the need for an effective technique. Feature extraction and similarity measurement are important for the performance of a CBIR technique. This work proposes a simple but efficient deep-learning framework based on convolutional-neural networks (CNN) for the feature extraction phase in CBIR. The proposed CNN aims to reduce the semantic gap between low-level and high-level features. The similarity measurements are used to compute the distance between the query and database image features. When retrieving the first 10 pictures, an experiment on the Corel-1K dataset showed that the average precision was 0.88 with Euclidean distance, which was a big step up from the state-of-the-art approaches.
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
Safety and security systems are essential for personnel who need to be protected and valuables. The security and safety system can be supported using a biometric system to identify and verify permitted users or owners. Finger vein is one type of biometric system that has high-level security. The finger vein biometrics system has two primary functions: identification and verification. Safety and security technology development is often followed by hackers' development of science and technology. Therefore, the science and technology of safety and security need to be continuously developed. The paper proposes finger vein identification using capsule networks with hyperparameter tuning. The augmentation, convolution layer parameters, and capsule layers are optimized. The experimental results show that the capsule network with hyperparameter tuning successfully identifies the finger vein images. The system achieves an accuracy of 91.25% using the Shandong University machine learning and applications-homologous multimodal traits (SDUMLA-HMT) dataset.
End-to-end deep auto-encoder for segmenting a moving object with limited tra...IJECEIAES
Deep learning-based approaches have been widely used in various applications, including segmentation and classification. However, a large amount of data is required to train such techniques. Indeed, in the surveillance video domain, there are few accessible data due to acquisition and experiment complexity. In this paper, we propose an end-to-end deep auto-encoder system for object segmenting from surveillance videos. Our main purpose is to enhance the process of distinguishing the foreground object when only limited data are available. To this end, we propose two approaches based on transfer learning and multi-depth auto-encoders to avoid over-fitting by combining classical data augmentation and principal component analysis (PCA) techniques to improve the quality of training data. Our approach achieves good results outperforming other popular models, which used the same principle of training with limited data. In addition, a detailed explanation of these techniques and some recommendations are provided. Our methodology constitutes a useful strategy for increasing samples in the deep learning domain and can be applied to improve segmentation accuracy. We believe that our strategy has a considerable interest in various applications such as medical and biological fields, especially in the early stages of experiments where there are few samples.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize
persons with a high degree of assurance. Extracting effective features is the most important stage in the
iris recognition system. Different features have been used to perform iris recognition system. A lot of
them are based on hand-crafted features designed by biometrics experts. According to the achievement of
deep learning in object recognition problems, the features learned by the Convolutional Neural Network
(CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed
an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The
proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for
features extracting and classification. The performance of the iris recognition system is tested on four
public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The
results show that the proposed system is achieved a very high accuracy rate.
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
This project investigates the use of face recognition for a surveillance system. The normal video surveillance system uses in closed-circuit television (CCTV) to record video for security purpose. It is used to identify the identity of a person through their appearances on the recorded video, manually. Today’s video surveillance camera system usually not occupied with a face recognition system. With some modification, a surveillance camera system can be used as face detection and recognition that can be done in real-time. The proposed system makes use of surveillance camera system that can identify the identity of a person automatically by using face recognition of Haar cascade classifier. The hardware used for this project were Raspberry Pi as a processor and Pi Camera as a camera module. The development of this project consist of three main phases which were data gathering, training recognizer, and face recognition process. All three phases have been executed using Python programming and OpenCV library, which have been performed in a Raspbian operation system. From the result, the proposed system successfully displays the output result of human face recognition, with facial angle within ±40°, in medium and normal light condition, and within a distance of 0.4 to 1.2 meter. Targeted image are allowed to wear face accessory as long as not covering the face structure. In conclusion, this system considered, can reduce the cost of manpower in order to identify the identity of a person in real time situation.
Dorsal hand vein authentication system using artificial neural networknooriasukmaningtyas
Biometric feature authentication technology had been developed and implemented for the security access system. However, the known biometric features such as fingerprint, face and iris pattern failed to provide ideal security. Dorsal hand vein is the features beneath the skin which makes it not easily be duplicated and forged. It was expected to be used in biometric authentication technology to achieve an ideal accuracy with the uniqueness of its characteristics. In this study, 240 images of 80 users were obtained from Bosphorus Hand Vein Database. The images were then pre-processed by cropping ROI, mean filtering, CLAHE enhancing and histogram equalizing. The ROI was then segmented by implementing binarization. The local binary pattern (LBP) features were then extracted from the binarized image. The extracted features were sent to an artificial neural network (ANN) for the classification of the images. The training result shows that the LBP features and ANN can recognize the dorsal hand vein pattern quite well with 90% recognition rate. The NN net was then utilized in the MATLAB GUI program for testing 100 images (80 trained images of 80 users and 20 untrained images of 20 users) from the Bosphorus Hand Vein Database. The results revealed 100% accuracy in their matching result.
Content-based image retrieval based on corel dataset using deep learningIAESIJAI
A popular technique for retrieving images from huge and unlabeled image databases are content-based-image-retrieval (CBIR). However, the traditional information retrieval techniques do not satisfy users in terms of time consumption and accuracy. Additionally, the number of images accessible to users are growing due to web development and transmission networks. As the result, huge digital image creation occurs in many places. Therefore, quick access to these huge image databases and retrieving images like a query image from these huge image collections provides significant challenges and the need for an effective technique. Feature extraction and similarity measurement are important for the performance of a CBIR technique. This work proposes a simple but efficient deep-learning framework based on convolutional-neural networks (CNN) for the feature extraction phase in CBIR. The proposed CNN aims to reduce the semantic gap between low-level and high-level features. The similarity measurements are used to compute the distance between the query and database image features. When retrieving the first 10 pictures, an experiment on the Corel-1K dataset showed that the average precision was 0.88 with Euclidean distance, which was a big step up from the state-of-the-art approaches.
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
Safety and security systems are essential for personnel who need to be protected and valuables. The security and safety system can be supported using a biometric system to identify and verify permitted users or owners. Finger vein is one type of biometric system that has high-level security. The finger vein biometrics system has two primary functions: identification and verification. Safety and security technology development is often followed by hackers' development of science and technology. Therefore, the science and technology of safety and security need to be continuously developed. The paper proposes finger vein identification using capsule networks with hyperparameter tuning. The augmentation, convolution layer parameters, and capsule layers are optimized. The experimental results show that the capsule network with hyperparameter tuning successfully identifies the finger vein images. The system achieves an accuracy of 91.25% using the Shandong University machine learning and applications-homologous multimodal traits (SDUMLA-HMT) dataset.
End-to-end deep auto-encoder for segmenting a moving object with limited tra...IJECEIAES
Deep learning-based approaches have been widely used in various applications, including segmentation and classification. However, a large amount of data is required to train such techniques. Indeed, in the surveillance video domain, there are few accessible data due to acquisition and experiment complexity. In this paper, we propose an end-to-end deep auto-encoder system for object segmenting from surveillance videos. Our main purpose is to enhance the process of distinguishing the foreground object when only limited data are available. To this end, we propose two approaches based on transfer learning and multi-depth auto-encoders to avoid over-fitting by combining classical data augmentation and principal component analysis (PCA) techniques to improve the quality of training data. Our approach achieves good results outperforming other popular models, which used the same principle of training with limited data. In addition, a detailed explanation of these techniques and some recommendations are provided. Our methodology constitutes a useful strategy for increasing samples in the deep learning domain and can be applied to improve segmentation accuracy. We believe that our strategy has a considerable interest in various applications such as medical and biological fields, especially in the early stages of experiments where there are few samples.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
1. TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 20, No. 4, August 2022, pp. 817~824
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.23759 817
Journal homepage: http://telkomnika.uad.ac.id
Towards more accurate and efficient human iris recognition
model using deep learning technology
Bashra Kadhim Oleiwi Chabor Alwawi1
, Ali Fadhil Yaseen Althabhawee2
1
Control and Systems Engineering Department, University of Technology, Baghdad, Iraq
2
Directorate General of Education in Karbala, Iraq
Article Info ABSTRACT
Article history:
Received Apr 15, 2021
Revised Jun 12, 2022
Accepted Jun 21, 2022
In this study, an end-to-end human iris recognition system is presented to
automatically identify individuals for high level of security purposes.
The deep learning technology based new 2D convolutional neural network
(CNN) model is introduced for extracting the features and classifying the iris
patterns. Firstly, the iris dataset is collected, preprocessed and augmented.
The dataset are expanded and enhanced using data augmentation, histogram
equalization (HE) and contrast-limited adaptive histogram equalization
(CLAHE) techniques. Secondly, the features of the iris patterns were
extracted and classified using CNN. The structure of CNN comprises of
convolutional layers and ReLu layers for extracting the features, pooling
layers for reducing the parameters, fully connected layer and Softmax layer
for classifying the extracted features into N classes. For the training process
and updating the weights, the backpropagation algorithm and adaptive
moment estimation Adam optimizer are used. The experimental results
carried out based on a graphics processing unit (GPU) and using Matlab.
The overall training accuracy of the introduced system was 95.33% with a
consumption time of 17.59 minutes for training set. While the testing
accuracy 100% with a consumption time of 12 seconds. The introduced iris
recognition system has been successfully applied.
Keywords:
Biometric security systems
Convolutional neural network
Deep learning
Histogram equalization
techniques
Iris recognition
This is an open access article under the CC BY-SA license.
Corresponding Author:
Bashra Kadhim Oleiwi Chabor Alwawi
Control and Systems Engineering Department, University of Technology
Baghdad, Iraq
Email: bushra.k.oleiwi@uotechnology.edu.iq
1. INTRODUCTION
The biometric technologies regarded as one of the most accurate, a common and reliable recognition
systems in the authentication and identification in different security applications such as control of the
borders [1], [2], authentication [3], forensic [4] the bank services and payments and commercial processes [5].
Recently, demand has increased for improving the daily life security in the digitalization direction in order to
enhance the reliability and intelligent identification systems using biometrics. The deep convolutional neural
network (CNN) is a class of artificial intelligence and has the ability to learn and extract the attributes
automatically similar to a human mind, whereas the classical neural network has the inability to learn
attributes automatically. There are many deep CNN architecture such as GoogleNet [6], AlexNet [7], residual
neural network (ResNet) [8], and visual geometry group (VGGNet) [9]. Daugman [10] introduced the iris
identification model based Gabor filter and Hamming distance using different iris dataset with high accuracy
and speed. Omran and AlShemmary [11] has proposed iris recognition system called IrisNet for extracting
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 817-824
818
the attributes of the Indian Institute of Technology Delhi (IITD) V1 iris dataset and classifying them
automatically. The structure of the IrisNet comprised of different CNN layers and trained using
backpropagation algorithm and Adam optimizer. Alaslani and Elrefaei [12] has proposed pre-trained network
based AlexNet model with support vector machine algorithm for extracting the attributes and classifying the
standard and segmented iris images based on four datasets: IITD, Chinese Academy of Science Institute for
Automation (CASIA) ver1.0 CASIAIris-V1, CASIA-Iris-thousand and CASIA-Iris-V3 with achieving
excellent performance with a very high accuracy rate. Minaee and Abdolrashidi [13] has proposed an
automated deep learning framework based residual CNN for iris recognition system. This system is trained
and tested on IIT Delhi iris dataset with high accuracy rate. Wang et al. [14] has introduced an eye recognition
framework utilizing deep learning based a mixed convolutional and residual network (MiCoRe-Net) and
achieved excellent accuracies on the CASIA-Iris-IntervalV4 and the University of Beira Interior Iris
(UBIRIS.v2) datasets. Azam and Rana [15] has introduced iris recognition system using CNN and SVM for
features extraction and classification, respectively based on CASIA database. In [16], [17] presented hybrid
model utilizing deep learning technlogy based CNN, segmentation approach imag preprocessing for noisy
iris dataset. In [18], [19] have suggested an autmated and efficient recognition system using CNN based
histogram equalization (HE) and contrast-limited adaptive histogram equalization (CLAHE) techniques for
intensive enhancement and detection of coronavirus disease of 2019 (COVID-19) chest X-ray images.
Althabhawee and Alwawi [20] has sugessted an accurate new CNN model for fingerprint matching for
authentication purposes. In [21]-[23] have applied real time object detection model for blind and visually
impaired people utilizing you only look once (YOLO) algorithm, USB camera and Raspberry model B Pi 3.
The proposed approach has been successfully achived the targeted goal and increased the efficiency of
recognition system. Most of the studies mentioned above either used sophisticated approaches or dealt with
fixed size and type of the images. Accordingly, in this study a new structure of deep CNN is presented as a
high-level of security identification system which detects iris patterns automatically. The proposed classifier
architecture for classifying iris patterns with minimum cost process and calculation time is analyzed. This paper
is structured as follows. In the second section, the description of the proposed iris recognition model utilized
deep learning technology based CNN is presented. The third section discusses the experimental results of the
proposed model. The fourth section introduces conclusion and futures work.
2. METHODOLOGY OF IRIS RECOGNITION MODEL
In this section, the methodology for proposed iris recognition model will be discussed. Figure 1
illustrates the structure of the proposed model which consists of five steps that are:
1. Dataset collection
2. Image preprocessing and augmentation
3. Attributes extraction
4. Classification
5. Matching
Figure 1. Proposed iris recognition model
3. TELKOMNIKA Telecommun Comput El Control
Towards more accurate and efficient human iris recognition … (Bashra Kadhim Oleiwi Chabor Alwawi)
819
2.1. Collected dataset
Multimedia University (MMU) database [24] is collected from a public available database which is
composed of iris patterns which can be used for training process based biometric identification models.
The uniqueness of the Iris images for each eye in every person is useful for individual identification. This
dataset comprises of 460 images for 46 persons with 5 images for each the left and right eye [24]. The iris
images are color with the size 320×240 pixel for each image and with depth as 3 dimension or channels.
A samples of MMU iris database are presented in Figure 2.
Figure 2. Samples of MMU iris dataset
2.2. Pre-processing and data augmentation
In this step the iris dataset preparation will be done to be used in the training model. The classification
accuracy of the deep learning techniques can be improved by image preprocessing and augmenting the existing
data better than collecting new raw data [25]. Thus, the variety of available data can be greatly improved the
performance for the training models. Data augmentation is very important technique for creating better
database and enlarging its size. As well as when the dataset is imbalanced, image augmentation technique is
essential to balance the dataset. In this study, the raw dataset includes 460 iris images. Therefore, it was
important to augment images for increasing the size of dataset usin image data augmenter tool in Matlab deep
learning toolbox [26] for generating sets of augmented images and creating modified versions of images in
the dataset such as images cropping, shifting, scaling, shearing, and flipping, as demostrated in Table 1.
Table 1. Used parameters of the data augmentation
Name Value
Zooming 20%
Rotation 10
Shifting Vertical/horizontal
Brightness [0.1, 1.5]
Followed by the visualization improvement of iris images utilizing image enhancement techniques
based HE and CLAHE [26]-[28]. HE is an important image processing technique that modifies the global
contrast of the entire image by adjusting the distribution of the pixel intensity of the image histogram. Then by
applying CLAHE technique, the results can be further enhanced histogram. Hence, CLAHE technique works
on small areas called named tiles in the image by improving the contrast of each tile in the image, so that the
output area histogram roughly matches a specified histogram. In CLAHE technique the neighboring tiles will
be combined using bilinear interpolation for eliminating induced boundaries artificially. The results before
and after applying HE and CLAHE techniques and the cumulative distribution function (CDF) behavior are
presented in Figure 3. Figure 3(a) the original on the left hand side and enhanced image based HE technique
on the right hand side, and Figure 3(b) the original on the left hand side and enhanced image based CLAHE
technique on the right hand side. The quality of the enhancement results has been increased as can be noticed
in Figure 3. This Figure shows how to adjust the contrast in the original image using HE and CLAHE
techniques. After completing the images preprocessing and augmentation, the total number of the dataset
became 4600.
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 817-824
820
(a)
(b)
Figure 3. Contrast adjustment in the original image using HE and CLAHE techniques: (a) the original and
enhanced image based HE technique on the left- and right-hand side, respectively and (b) the original and
enhanced image based CLAHE technique on the left and right hand side, respectively
2.3. Proposed CNN model
In this step, the CNN model [29], [30] for extracting features and classifying of the iris images
automatically will be designed. The proposed CNN structure has ten layers, beginning with the input layer and
continuing with two convolution layers, two activation ReLu layers, two pooling layers, one fully connected
layer, softmax layer, and finally the output layer, as described the proposed model’s detailed structure and steps
of the training algorithm in Table 2, Figure 4, and Table 3. The backpropagation algorithm [31] is used for
training procedure, and Adam optimizer [32] for updating the weight. The dataset was divided into 80% for
training set and 20% for testing set. The images were trained using batch size of 4, learning rate of 0.0001,
for maximum of 400 epochs using Adam optimizer. The following algorithm in Table 2 illustrates the
detailed steps for the proposed model.
Table 2. Detailed steps for the training algorithm
Algorithm 1. Applying tha main steps of proposed CNN model for extracting the features and classifying
Requirement: database of iris images
Taining steps:
1. Dividing the iris image into two sets (design set and testing set)
2. Dividing design set into two sets (training and validation set)
3. Training (CNN model, training set and validation set)
4. Finishing the training process when the desired performance and criteria are achieved
5. Returen: training CNN model
Testing steps:
1. Evaluating CNN model
2. Extracting the features of the testing set
3. End
5. TELKOMNIKA Telecommun Comput El Control
Towards more accurate and efficient human iris recognition … (Bashra Kadhim Oleiwi Chabor Alwawi)
821
Figure 4. The structure of the CNN for iris recognition
3. EXPERMENTAL RESULTS
In order to carry out the proposed CNN model using collected and augmented iris dataset,
the Matlab (2020a) is used and installed on personal computer (PC) desktop acer of the 4th
generation
processors, intel ® core (TM) i7-4790 CPU at 3.60 GHz and 64 operating system and windows 10 pro with
8.00 GB RAM. The graphics processing unit (GPU) type used NVIDIA GeForce GTX 1060 RAM 3GB.
Verification of the performance of the proposed model and evaluation of its classification accuracy on the
basis of the features extracted from the training set and the test set were carried out. Figure 5 shows the CNN
performance evaluation. Whereas, increasing the number epoch will improve the training process through
achieving the best results and increase the reliability but would be also increased the amount elapsed and this
is clearly seen in Figure 5. The performance for the behavior of the proposed CNN model and accuracy of a
training stage with constant values of a number of epochs as well as iterations, and frequency of validity and
learning rate are presented in Figure 6. The percentage values of overall training accuracy was 95.33% with a
consumption time of 17.59 minutes for 400 epochs. While the testing accuracy 100% with a consumption
time of 12.097 seconds. Training and validation steps shown that the overall accuracy was excellent and the
proposed iris recognition model has been successfully applied.
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 817-824
822
Table 3. Detailed description of the proposed CNN layers
Type of layer Feature map size No. of filter Size of kernel Padding no. Stride no.
Input layer 240×320×1
(height×width×channel)
N/L N/L N/L N/L
Second layer (1st convolution. layer) 240×320×10 10 3×3 0×0 0×0
(3rd
normalization ReLu -2 layer) N/L N/L N/L N/L N/L
(4th
max pooling layer) N/L N/L 2×2 0×0 2×2
5th
layer (2cd convolution layer) 240×320×10 10 3×3 0×0 0×0
(6th
normalization ReLu-2 layer) N/L N/L N/L N/L N/L
(7th
max pooling layer) N/L N/L 2×2 0×0 2×2
Fully connected dropout layer layer-8 (fc8)
Classification layer
Softmax layer
Output layer
45×1 N/L N/L N/L N/L
Figure 5. Performance evaluation of the training process.
Figure 6. Accuracy and loss rate of the training process
7. TELKOMNIKA Telecommun Comput El Control
Towards more accurate and efficient human iris recognition … (Bashra Kadhim Oleiwi Chabor Alwawi)
823
4. CONCLUSION
In this study, an efficient and effective features extraction and classification system is presented
using deep learning based CNN for human iris images. The introduced system included preprocessing and
augmentation of the iris images followed by extracting the features and classification. The overall
performance of the introduced system achieved high training accuracy 95.33% with consuming time 17:59
minutes for 400 epochs. While the testing accuracy was 100% with a consumption time 12 seconds. Training
and validation steps shown that the overall accuracy is very good. Further extension of the introduced system
can be focused on using different iris databases and different deep learning techniques as compassion study,
multimodal classification system.
REFERENCES
[1] J. Daugman and I. Malhas, “Iris Recognition Border-Crossing System in the UAE,” International Airport Review, no. 2, 2004.
[Online]. Available: https://www.cl.cam.ac.uk/~jgd1000/UAEdeployment.pdf
[2] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” in IEEE Transactions on Circuits and Systems
for Video Technology, vol. 14, no, 1, pp. 4-20, 2004, doi: 10.1109/TCSVT.2003.818349.
[3] J. Daugman, “600 Million citizens of india are now enrolled with biometric ID,” SPIE Newsroom, May 2014,
doi: 10.1117/2.1201405.005449.
[4] R. W. V. Bruegge, “Forensic Data for Face and Iris,” FBI Science and Technology Branch, 2010. Accessed: March. 12, 2022.
[Online]. Available: https://www.nist.gov/system/files/documents/2021/03/18/ansi-nist_archived_2010_forensic_data_for_face_
iris.pdf
[5] Z. Zhao and A. Kumar, “Towards more accurate iris recognition using deeply learned spatially corresponding features,” 2017
IEEE International Conference on Computer Vision (ICCV), 2017, pp. 3829-3838, doi: 10.1109/ICCV.2017.411.
[6] C. Szegedy et al., “Going deeper with convolutions,” 2015 IEEE Conference on Computer Vision and Pattern Recognition
(CVPR), 2015, pp. 1-9, doi: 10.1109/CVPR.2015.7298594.
[7] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proc. of the
25th International Conference on Neural Information Processing Systems, 2012, vol. 1, pp. 1097-1105. [Online]. Available:
https://proceedings.neurips.cc/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf
[8] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi, “Inception-v4, inception-resnet and the impact of residual connections on
learning,” in Proc. of the Thirty-First AAAI Conference on Artificial Intelligence, 2017, pp. 4278-4284,
doi: 10.48550/arXiv.1602.07261.
[9] K. Simonyan, and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in Proc. of the 3rd
International Conference on Learning Representations (ICLR2015), 2015, doi: 10.48550/arXiv.1409.1556.
[10] J. Daugman, “How iris recognition works,” in IEEE Transactions on Circuits and Systems for Video Technology, pp. 21-30, 2004.
[Online]. Available: https://www.robots.ox.ac.uk/~az/lectures/est/iris.pdf
[11] M. Omran and E. N. AlShemmary, “An iris recognition system using deep convolutional neural network,” Journal of Physics:
Conference Series, vol. 1530, 2020, doi: 10.1088/1742-6596/1530/1/012159.
[12] M. G. Alaslani and L. A. Elrefaei, “Convolutional neural network based feature extraction for iris,” International Journal of
Computer Science and Information Technology (IJCSIT), vol. 10, no. 2, pp. 65-78, Apr. 2018. [Online]. Available:
https://aircconline.com/ijcsit/V10N2/10218ijcsit06.pdf
[13] S. Minaee and A. Abdolrashidi, “DeepIris: Iris recognition using a deep learning approach,” ArXiv, 2019,
doi: 10.48550/arXiv.1907.09380.
[14] Z. Wang, C. Li, H. Shao, and J. Sun, “Eye recognition with mixed convolutional and residual network (MiCoRe-Net),” IEEE
Access, vol. 6, pp. 17905–17912, 2018, doi: 10.1109/ACCESS.2018.2812208.
[15] M. S. Azam and H. K. Rana, “Iris recognition using convolutional neural network,” International Journal of Computer
Applications, vol. 175, no. 12, 2020, doi: 10.5120/ijca2020920602.
[16] H. J. Abdelwahed, A. T. Hashim, and A. M. Hasan, “Segmentation approach for a noisy iris images based on hybrid techniques,”
Engineering and Technology Journal, vol. 38, no. 11, pp. 1684-1691, 2020, doi: 10.30684/etj.v38i11A.450.
[17] A. T. Hashim and D. A. Noori “An approach of noisy color iris segmentation based on hybrid image processing techniques,” 2016
International Conference on Cyberworlds (CW), 2016, pp. 183-188, doi: 10.1109/CW.2016.39.
[18] B. K. Oleiwi, “Scouting and Controlling for Mobile Robot based Raspberry PI 3”, Journal of Computational and Theoretical
Nanoscience, vol. 16, no.1, pp. 79-83(5), 2019, doi: 10.1166/jctn.2019.7701.
[19] B. K. O. C. Alwawi and L. H. Abood, “Convolution neural network and histogram equalization for COVID-19 diagnosis system,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 24, no. 1, pp. 420-427, Oct. 2021,
doi: 10.11591/ijeecs.v24.i1.pp420-427.
[20] A. F. Y. Althabhawee and B. K. O. C. Alwawi, “Fingerprint recognition based on collected images using deep learning
technology,” IAES International Journal of Artificial Intelligence (IJ-AI), vol. 11, no. 1, pp. 81–88, Mar. 2022,
doi: 10.11591/ijai.v11.i1.pp81-88.
[21] B. K. Oleiwi, L. H. Abood and A. K. Farhan, “Integrated different fingerprint identification and classification systems based deep
learning,” 2022 International Conference on Computer Science and Software Engineering (CSASE), 2022, pp. 188-193,
doi: 10.1109/CSASE51777.2022.9759632.
[22] Z. A. Kamal and A. F. Kadhim, “Generating dynamic S-box based on particle swarm optimization and chaos theory for AES,”
Iraqi Journal of Science, vol. 59, no. 3C, pp. 1733-1745, 2018. [Online]. Available:
https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/367/247
[23] M. R. Kadhim and B. K. Oleiwi, “Blind Assistive System based on Real Time Object Recognition using Machine learning,”
Engineering and Technology Journal, vol. 40, no. 1, pp. 159-165, 2022, doi: 10.30684/etj.v40i1.1933.
[24] MMU iris dataset, MultiMedia University (MMU) Iris database for Biometric Attendance system, Accessed: Mar. 12, 2022.
[Online]. Available: https://www.kaggle.com/naureenmohammad/mmu-iris-dataset.
[25] C. Shorten and T. M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” Journal of Big Data, vol. 6,
no. 60, 2019, doi: 10.1186/s40537-019-0197-0.
[26] P. Kim, MATLAB deep learning: with machine learning, neural networks and artificial intelligence, Apress Berkeley, CA, 2017,
doi: 10.1007/978-1-4842-2845-6.
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 817-824
824
[27] O. Patel, Y. P. S. Maravi, and S. Sharma, “A comparative study of histogram equalization based image enhancement techniques
for brightness preservation and contrast enhancement,” Signal & Image Processing : An International Journal (SIPIJ), vol. 4,
no. 5, Oct. 2013, doi: 10.5121/sipij.2013.4502.
[28] R. C. Gonzalez and R. E. Woods, Digital image processing, 2008. [Online]. Available:
http://sdeuoc.ac.in/sites/default/files/sde_videos/Digital%20Image%20Processing%203rd%20ed.%20-
%20R.%20Gonzalez%2C%20R.%20Woods-ilovepdf-compressed.pdf
[29] D. Cireşan, U. Meier and J. Schmidhuber, “Multi-column deep neural networks for image classification,” arXiv, 2012,
doi: 10.48550/arXiv.1202.2745.
[30] M. Thoma, “Analysis and optimization of convolutional neural network architectures, arXiv, 2017,
doi: 10.48550/arXiv.1707.09725.
[31] A. F. Gad, Practical computer vision applications using deep learning with CNNs with detailed examples in Python using
TensorFlow and Kivy, Apress Berkeley, CA, 2018, doi: 10.1007/978-1-4842-4167-7.
[32] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv, 2014, doi: 10.48550/arXiv.1412.6980.
BIOGRAPHIES OF AUTHORS
Bashra Kadhim Oleiwi Chabor Alwawi was born in Baghdad-Iraq, completed a
Master degree in Mechatronics Engineering/Control and Systems Engineering Department at
University of Technology (UOT) Bagdad-Iraq. She finished her Ph.D. degree at Control
Engineering Department (RST), Siegen University, Germany. Her research interests are
robotics, path planning, control, multi objective optimization and artificial intelligence systems
and deep learning and machine learning. She is currently working as a faculty member in
control and systems engineering department at UOT. She can be contacted at email:
bushra.k.oleiwi@uotechnology.edu.iq.
Ali Fadhil Yaseen Althabhawee was born in Karbala-Iraq, completed B.Sc.
degree in Computer Engineering at Alhussain University college, Karbala-Iraq. He finished his
M.Sc.degree in Computer Engineering at University of Technology, Bagdad-Iraq. His research
interests are artificial intelligence systems and deep learning and machine learning and
programming languages. He is currently working as computer engineer at the Directorate
General of Education in Holy Karbala Province Iraq. He can be contacted at email:
61124@student.uotechnology.edu.iq.