Study of Principal Component Analysis (PCA) as a face recognition method
Journal ArticleFace recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.
AR Shtewi, (04-2022), ليبيا /سرت: Scientific Journal for Faculty of Science-Sirte University, 2 (1), 28-32
The System for Estimating the Number of People in Digital Images Based on Skin Color Face Detection Algorithm
Journal ArticleCounting the number of people in many estimation systems, such as still images or video frames, is a buoyant research area that is challenging in the field of computer vision. It plays a considerable role in a variety of applications, such as security, management, education, and commerce. The purpose of this paper is to suggest a system to estimate the number of people in digital still images based on the Face Detection method. This system composed of two parts: face detection and counting of detected faces. In the detection step, the Skin Color Face Detection method was applied on the input of a digital still image. In the counting part, the obtained detected faces by the Skin Color Face Detection method have counted to estimate the number of people in an input color image with simple software and simple low-cost hardware. The skin color face detection algorithm was tested using 133 images from the People Image Groups dataset, which contains about 2573 color images of people, to test the proposed system. based on the obtained results, the best precision achieved of the proposed Skin Color face detection algorithm was 85%
Tarik Idbeaa, (04-2022), Alq J Med App Sci: AlQalam Journal of Medical and Applied Sciences (AJMAS), 5 (1), 215-225
Study of Principal Component Analysis (PCA) as Face Recognition Method
Journal ArticleFace recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.
Entisar Nassr Abdulati Abolkasim, (04-2022), Scientific Journal for the Faculty of Science- Sirte University: Scientific Journal for the Faculty of Science-Sirte University, 1 (2), 18-32
التحديات التي تواجه الانتقال السريع من التعليم التقليدي إلى التعليم عن بُعد (دراسة تقييمية لأداء منصة جامعة غريان الالكترونية)
مقال في مؤتمر علمييعتمد التعليم التقليدي على مجموعة عناصر أساسية، أهمها على الإطلاق المنهج التعليمي، المحاضر و الطالب، إلا أن هذه العناصر الأساسية أضيفت إليها عنصر جديد في التعليم عن بعد ألا وهو البيئة الإلكترونية. في ظل جانحة كورونا 19COVID والتي بدأت مع نهاية سنة 9102 والتحول السريع من التعليم التقليدي الي التعليم عن يعد الخطط التعليمية المعدة مسبقا فيه تطوير ً بعد و إشراك التعليم عن بعد في تنف . هذا التحول السريع والذي لم يتم َ أدي الي ظهور بعض المشاكل في مخرجات العملية التعليمية. فالتعليم عن عناصر التعليم ولم يتم الإعداد له مسبقا بعد وإن كانت عناصره الأساسية هي نفس عناصر التعليم التقليدي إلا أن الأسلوب في تنفيذه أختلف بإدخال عنصر جديد أساسي وهو البيئة الإلكترونية التي من خلالها يتم تنفيذ الخطط التعليمية. في هذه الورقة البحثية سوف يتم دراسة أهم العناصر الفاعلة والمؤثرة في العملية التعليمية للتعليم عن بعد والمشاكل الناجمة عن هذا التحول السريع ثم إيجاد الحلو ل المناسبة لمواكبة التطور في سير العملية التعليمية وذلك من خلال دراسة تقييمية لتجربة كلية العلوم بجامعة غريان وسوف تكون نتائج هذا البحث مفيدة لتنفيذ التغيرات في النظام التعليمي ولتلبية متطلبات المعايير التعليمية الحديثة للتعليم العالي.
أيمن أحمد محمد أحمد، ناصر علي أبوراوي الفيض، طارق الهادي محمد خليفة، عبدالحكيم مصطفى التريكي، كمال المبروك سليمان، حاتم أحمد محمد المبروك، (02-2022)، ليبيا: المؤتمر العلمي الأول لتقنية المعلومات وعلوم الحاسوب كلية تقنية المعلومات، 45-56
Revisiting Virtual Execution Policies for Optimistic Concurrency Control: The Real-Time Benefits of Writing Before Validating.
Journal ArticleIn this paper we present an approach to optimistic concurrency control where the write phase occurs before the validation phase (RWV instead of RVW). Our work extends earlier research into real-time databases that utilized virtual execution to lower disk access overheads. Such work demonstrated that virtual execution allowed an increase in transactions completing before deadlines expired and improvements in overall throughput. However, we demonstrate that only with the reversal of the write and validation phases can virtual execution reach its full potential.
Naser Alfed, Kamal Solaiman, Khaled Farj, Abubkr Abdelsadiq, (12-2021), ليبيا: جامعة غريان, 22 (2),
HIGH HIDING CAPACITY AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM
Journal ArticleThis paper presents a new high-capacity algorithm for audio watermarking for the purpose of embedding a watermark audio signal into an original audio signal. This algorithm uses DCT (discrete cosine transform) in combination with SVD (singular value decomposition), DWT (discrete wavelet transform), and CZT (chirp ztransform). For the purpose of ensuring high levels of imperceptibility and robustness, a low-frequency sub band of 1-level DWT is selected to embed the watermark, followed by DCT, CZT, and SVD. As a result, the proposed algorithm achieves a high capacity of 352800 bits per second while a good quality audio signal is maintained (having an objective difference grade of more than-0.04). It also provides high imperceptibility (a signal to noise ratio of more than 58 dB) and it is extremely resistant to common audio attacks, including requantizing, resampling, additive white Gaussian noise or AWGN, MP3 compression, and low-pass filtering. The proposed algorithm presents much better compared to the audio watermarking algorithms already existent.
Omar Moftah Ibrahim Abodena, Ali Alashtir, (08-2021), International Journal of Advance Research and Innovative Ideas in Education: IJARIIE, 7 (4), 677-684
Robust and high-capacity audio watermarking basedon chirp z-transform
Conference paperA novel non-blind audio watermarking algorithm, using chirp z-transform in combination with discrete wavelet transform and singular value decomposition, is presented in this paper. In the proposed method, a watermark audio signal (about 13 seconds in length) is hidden into an original audio signal (about 51 seconds in length) by applying discrete wavelet transform, chirp z-transform, and singular value decomposition. The effectiveness of the proposed algorithm has been tested using signal-to-noise ratio, objective difference grade (ODG), and normalised cross- correlation of watermarked audio signal under various common audio attacks. Experimental results demonstrate that the algorithm has a high capacity (352.8 kbps), without significant perceptual distortion (ODG > -0.29) and provides good robustness against common audio attacks, including: re-sampling, echo addition, MP3 compression, additive white Gaussian noise, re- quantisation, cutting, and low-pass filtering. This algorithm has a high capacity and excellent audio quality compared with other audio watermarking algorithms.
Omar Moftah Ibrahim Abodena, (05-2021), 2021 29th IEEE Signal processing and communications applications conference (SIU): IEEE, 1-4
Accreditation Process and Outcomes: Experience of the University of Tripoli Alahlia, Libya
Journal ArticleQuality assurance and institutional accreditation in education is becoming of paramount importance. This study aims to assess the impacts of the accreditation process of the National Center for Quality Assurance and Accreditation (NCAAA) on the quality of education in one of private university in Libya. Methods: The research adopts a descriptive study design in University of Tripoli Alahlia (UTA) where an official accreditation process was completed by the NCQAA during 2017-2019. Data were collected using the self-study report that produced by the NCQAA accreditation committee during the accreditation process, and were retrieved in specific data collection sheet by one of the authors. Results: The NCQAA accreditation process that lasted about 4 years brought significant changes in the educational progressions and made the staff members more aware of quality issues in education. Our findings also reported significant improvements in the quality of education in the university. Conclusions: The process of NCQAA accreditation conducted in UTA has been positively improved the quality of education. Data from other institutions would also expressively increase the relevance and rationality of the study.
Tarik F. Idbeaa, (03-2020), Center for Open Access in Science (COAS): OPEN JOURNAL FOR SOCIOLOGICAL STUDIES (OJSS), 4 (1), 13-20
ROBUST WATERMARKING TECHNIQUES FOR COPYRIGHT PROTECTION
PhD ThesisWatermarking techniques have been considered as one of the best efficacious methods
to solve the issues of protecting copyright due to the proliferation of digital multimedia
information on the internet. The digital multimedia information is such as image,
audio, and video which can today be easily copied, distributed, and modified without
loss in fidelity. As a result, it is necessary to utilize some kind of copyright protection
techniques to avoid illegal copying, distribution, and digital copyright modification.
The digital watermarking techniques have engaged the researchers’ attention as a
technique for protecting copyright in the digital multimedia information. This
technique includes a subcategory of information-hiding technologies in which the
ownership information is hidden into the original multimedia information without
impacting the original multimedia information quality. Despite the advances in digital
watermarking techniques, the main objective of many types of research in digital
watermarking topic is to improve transparency and resistance to attacks and the present
digital watermarking schemes are not sufficiently stable or strong against various
attacks. This study aims to develop state-of-the-art digital watermarking techniques
for different multimedia information through improving the imperceptibility and
robustness to geometrical attacks and signal processing operations. Four novel robust
blind digital watermarking schemes are introduced in this thesis for copyright
protection of multimedia information that have not been previously introduced. The
first robust blind digital watermarking scheme is applied for colour images utilizing
discrete wavelet transform in combination with Walsh Hadamard transform and
Hessenberg decomposition. The second robust blind digital watermarking scheme is
applied for grayscale images utilizing discrete wavelet transform in combination with
Walsh Hadamard transform and Hessenberg decomposition. The third robust blind
digital watermarking scheme is applied for colour videos utilizing discrete wavelet
transform in combination with Walsh Hadamard transform and Hessenberg
decomposition. Forth robust blind digital watermarking scheme is applied for audio
signals utilizing discrete wavelet transform in combination with Walsh Hadamard
transform and Hessenberg decomposition. Several experiments are performed in order
to present the effectiveness of the proposed digital watermarking schemes in terms of
imperceptibility and robustness against attacks related to each scheme. The proposed
digital watermarking schemes achieve good imperceptibility and robustness against
geometrical attacks and signal processing operations. The proposed digital
watermarking schemes have a superior performance in terms of imperceptibility and
robustness than other reported schemes in the literature.
Keywords: Watermarking, Copyright Protection, Discrete Wavelet Transform, Walsh
Hadamard Transform, Hessenberg Decomposition.
Omar Moftah Ibrahim Abodena, (08-2019), Cyprus International University: Cyprus International University,
Semantic Approach to Model Diversity in a Social Cloud
PhD ThesisUnderstanding diversity is important in our inclusive society to hedge against ignorance and accommodate plural perspectives. Diversity nowadays can be observed in online social spaces. People from different backgrounds (e.g. gender, age, culture, expertise) are interacting every day around online digital objects (e.g. videos, images and web articles) leaving their social content in different format, commonly as textual comments and profiles. The social clouds around digital objects (i.e. user comments, user profiles and other metadata of digital objects) offer rich source of information about the users and their perspectives on different domains. Although, researchers from disparate disciplines have been working on understanding and measuring diversity from different perspectives, little has been done to automatically measure diversity in social clouds. This is the main objective of this research. This research proposes a semantic driven computational model to systematically represent and automatically measure diversity in a social cloud. Definitions from a prominent diversity framework and Semantic Web techniques underpin the proposed model. Diversity is measured based on four diversity indices - variety, balance, coverage and (within and across) disparity with regards to two perspectives – (a) domain, which is captured in user comments and represented by domain ontologies, and (b) user, which is captured in profiles of users who made the comments and represented by a proposed User Diversity Ontology. The proposed model is operationalised resulting in a Semantic Driven Diversity Analytics Tool (SeDDAT), which is responsible for diversity profiling based on the diversity indices. The proposed approach of applying the model is illustrated on social clouds from two social spaces - open (YouTube) and closed (Active Video Watching (AVW-Space)). The open social cloud shows the applicability of the model to generate diversity profiles of a large pool of videos (600) with thousands of users and comments. Closed social clouds of two user groups around same set of videos illustrate transferability and further utility of the model. A list of possible diversity patterns within social clouds is provided, which in turn deepen the understanding of diversity and open doors for further utilities of the diversity profiles. The proposed model is applicable in similar scenarios, such as in the social clouds around MOOCs and news articles.
Entisar Nassr Abdulati Abolkasim, (01-2019), The University of Leeds, The United Kingdom: The University of Leeds,