
Farah F. Alkhalid- Ms in Computer Engineering
- Uuniversity of Technology-Iraq
Farah F. Alkhalid
- Ms in Computer Engineering
- Uuniversity of Technology-Iraq
About
23
Publications
6,520
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
89
Citations
Introduction
Current institution
Uuniversity of Technology-Iraq
Publications
Publications (23)
Handwritten digit recognition has been widely researched by the recognition society during the last decades. Deep convolutional neural networks (CNN) have been exploited to propose efficient handwritten digit recognition approaches. However, the CNN model may need an optimization algorithm to achieve satisfactory performance. In this work, a perfor...
Network security has recently become a major issue since the growth of electronic data exchange so cryptography is important in protecting secure online data resources from integrity, confidentiality, and safety perspective against potential attacks such as eavesdropping and brute force. In this paper, we proposed a method for encrypting the transm...
With the rapid expansion of electronic data transmission, unauthorized data access is growing. Information security against unwanted access is becoming increasingly essential in data storage and data transfer. Images are a common type of information that is used in almost every aspect of life, so the security of image data against unwanted access i...
Optimizers are approaches or algorithms dependent to enhance the characteristics of the Neural Network (NN) like weights and learning rate in order to decrease the loss rate, On the other hand, Siamese Neural Network (SNN) are two identical sub-networks, they work in parallel and they are sharing parameters and weight, SNN uses for indicate similar...
Nowadays, when data is exchanged over the internet, the security of data is critical in every element of life. Unauthorized network access is possible due to information transmission. As image usage increased in most communications, image privacy became an issue. Image encryption is one of the methods used to protect images online. In this paper, w...
The main important factor that plays vital role in success the deep learning is the deep training by many and many images, if neural networks are getting bigger and bigger but the training datasets are not, then it sounds like going to hit an accuracy wall. Briefly, this paper investigates the current state of the art of approaches used for a data...
In the circumstance of the COVID-19 pandemic, Prevention is better than cure, especially if the cure is not available, the first motto that all health organizations recommend is keep distances between people to prevent epidemic spread. In this paper, an online multi layers social distance detection system is proposed, the main idea is to detect dis...
span id="docs-internal-guid-43432eef-7fff-9949-6deb-865191ff0740"> Usually, X-ray image has distortion in many parts because it is focusing on bones rather than other, However, when dentist needs to make decision analysis, he does that by using X-ray and many opinions can be judged by looking closely on it like (inflammation, infection, tooth nerve...
p>Fingerprint is the most popular way to identify persons, it is assumed a unique identity, which enable us to return the record of specific person through his fingerprint, and could be useful in many applications; such as military applications, social applications, criminal applications… etc. In this paper, the study of a new model based deep lear...
One of the most challenges that face machine learning is handwritten recognition, especially Arabic scripts, because many styles found for Arabic font. In this paper, an investigation model is proposed to make recognition for Arabic handwritten scripts utilizing Convolutional Neural Network (CNN), with multi layers of Normalization and Regularizati...
Sometimes, there are cases in intensive care unit (ICU) in hospital need to be monitored continuously to take a certain action in case of any movement by the patient, such as coma cases and does not know when will happen. This paper proposes a smart surveillance system for monitoring a coma patient in ICU, by using frame difference algorithm to rec...
This study focuses on the design of an autonomous wheelchair based
smart driving features for disabled persons. The movement directions and
position tracking of the wheelchair are controlled and localized by pre-defined
voice commands and global positioning system (GPS), respectively. Arduino
microcontroller based on speaker dependent voice recogni...
This paper addresses the voice recognition problem of handicapped people based on HMM algorithm and provides a system that let disabled people and elders to manage part of their life independently, like turn on and off some electric devices in home by voice commands. Arduino Uno is used as microcontroller which senses a voice command via microphone...
In these exceptional circumstances, there is an urgent need to reassure everyone who leaves the house from time to time, especially schoolchildren, where Iraqi school laws prohibit the use of cell phones and disturb the vehicle driver by making calls to ensure that he is on the way home not allowed according to traffic laws. So this work proffers a...
With the development of technologies and the availability of internet in the present era, the human has been looking for ease and efficiency in running his business, the educational field has been affected by a radical revolution as a result of the introduction of advanced technology. This has led educational institutions to provide and utilize all...
Virtual Private Network (VPN) is very important network that allows establishing private tunnel over public internet, Point-to-Point Tunneling Protocol (PPTP) is one of essential protocol that helps to manage the tunnel, and there are two types of PPTP tunneling (Voluntary and Compulsory), this paper focuses on the effects of each type of tunneling...
Recently, the use of mobile devices to run multimedia applications is becoming more
popular. Such applications are known to be energy consuming. Since these devices are mostly
battery powered with a limited battery life, energy saving strategies becomes vital for such
systems operation. WiMAX systems utilize a standard sleep mode in order to reduce...
This thesis implements the sleep mode with OPNET modeler 14.5
which does not support the sleep mode by using C language with Proto-C
(OPNET modeler programming functions).
0T Also, considers the impact of each power saving class on the
transmission power and delay with different applications: Voice over IP
(VoIP), Hyper Text Transfer Protocol (HTTP...