• Home
  • Farah F. Alkhalid
Farah F. Alkhalid

Farah F. Alkhalid
  • Ms in Computer Engineering
  • Uuniversity of Technology-Iraq

About

23
Publications
6,520
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
89
Citations
Current institution
Uuniversity of Technology-Iraq

Publications

Publications (23)
Article
Full-text available
Handwritten digit recognition has been widely researched by the recognition society during the last decades. Deep convolutional neural networks (CNN) have been exploited to propose efficient handwritten digit recognition approaches. However, the CNN model may need an optimization algorithm to achieve satisfactory performance. In this work, a perfor...
Article
Full-text available
Network security has recently become a major issue since the growth of electronic data exchange so cryptography is important in protecting secure online data resources from integrity, confidentiality, and safety perspective against potential attacks such as eavesdropping and brute force. In this paper, we proposed a method for encrypting the transm...
Article
Full-text available
With the rapid expansion of electronic data transmission, unauthorized data access is growing. Information security against unwanted access is becoming increasingly essential in data storage and data transfer. Images are a common type of information that is used in almost every aspect of life, so the security of image data against unwanted access i...
Conference Paper
Full-text available
Optimizers are approaches or algorithms dependent to enhance the characteristics of the Neural Network (NN) like weights and learning rate in order to decrease the loss rate, On the other hand, Siamese Neural Network (SNN) are two identical sub-networks, they work in parallel and they are sharing parameters and weight, SNN uses for indicate similar...
Article
Full-text available
Nowadays, when data is exchanged over the internet, the security of data is critical in every element of life. Unauthorized network access is possible due to information transmission. As image usage increased in most communications, image privacy became an issue. Image encryption is one of the methods used to protect images online. In this paper, w...
Article
Full-text available
The main important factor that plays vital role in success the deep learning is the deep training by many and many images, if neural networks are getting bigger and bigger but the training datasets are not, then it sounds like going to hit an accuracy wall. Briefly, this paper investigates the current state of the art of approaches used for a data...
Article
Full-text available
In the circumstance of the COVID-19 pandemic, Prevention is better than cure, especially if the cure is not available, the first motto that all health organizations recommend is keep distances between people to prevent epidemic spread. In this paper, an online multi layers social distance detection system is proposed, the main idea is to detect dis...
Article
Full-text available
span id="docs-internal-guid-43432eef-7fff-9949-6deb-865191ff0740"> Usually, X-ray image has distortion in many parts because it is focusing on bones rather than other, However, when dentist needs to make decision analysis, he does that by using X-ray and many opinions can be judged by looking closely on it like (inflammation, infection, tooth nerve...
Article
Full-text available
p>Fingerprint is the most popular way to identify persons, it is assumed a unique identity, which enable us to return the record of specific person through his fingerprint, and could be useful in many applications; such as military applications, social applications, criminal applications… etc. In this paper, the study of a new model based deep lear...
Article
One of the most challenges that face machine learning is handwritten recognition, especially Arabic scripts, because many styles found for Arabic font. In this paper, an investigation model is proposed to make recognition for Arabic handwritten scripts utilizing Convolutional Neural Network (CNN), with multi layers of Normalization and Regularizati...
Article
Full-text available
Sometimes, there are cases in intensive care unit (ICU) in hospital need to be monitored continuously to take a certain action in case of any movement by the patient, such as coma cases and does not know when will happen. This paper proposes a smart surveillance system for monitoring a coma patient in ICU, by using frame difference algorithm to rec...
Article
This study focuses on the design of an autonomous wheelchair based smart driving features for disabled persons. The movement directions and position tracking of the wheelchair are controlled and localized by pre-defined voice commands and global positioning system (GPS), respectively. Arduino microcontroller based on speaker dependent voice recogni...
Article
This paper addresses the voice recognition problem of handicapped people based on HMM algorithm and provides a system that let disabled people and elders to manage part of their life independently, like turn on and off some electric devices in home by voice commands. Arduino Uno is used as microcontroller which senses a voice command via microphone...
Article
In these exceptional circumstances, there is an urgent need to reassure everyone who leaves the house from time to time, especially schoolchildren, where Iraqi school laws prohibit the use of cell phones and disturb the vehicle driver by making calls to ensure that he is on the way home not allowed according to traffic laws. So this work proffers a...
Article
Full-text available
With the development of technologies and the availability of internet in the present era, the human has been looking for ease and efficiency in running his business, the educational field has been affected by a radical revolution as a result of the introduction of advanced technology. This has led educational institutions to provide and utilize all...
Article
Full-text available
Virtual Private Network (VPN) is very important network that allows establishing private tunnel over public internet, Point-to-Point Tunneling Protocol (PPTP) is one of essential protocol that helps to manage the tunnel, and there are two types of PPTP tunneling (Voluntary and Compulsory), this paper focuses on the effects of each type of tunneling...
Article
Full-text available
Recently, the use of mobile devices to run multimedia applications is becoming more popular. Such applications are known to be energy consuming. Since these devices are mostly battery powered with a limited battery life, energy saving strategies becomes vital for such systems operation. WiMAX systems utilize a standard sleep mode in order to reduce...
Thesis
Full-text available
This thesis implements the sleep mode with OPNET modeler 14.5 which does not support the sleep mode by using C language with Proto-C (OPNET modeler programming functions). 0T Also, considers the impact of each power saving class on the transmission power and delay with different applications: Voice over IP (VoIP), Hyper Text Transfer Protocol (HTTP...

Network

Cited By