Design of a novel hybrid quantum deep neural network in INEQR images classification DOI Creative Commons
Shuang Wang,

Ke-Han Wang,

Tao Cheng

et al.

Chinese Physics B, Journal Year: 2024, Volume and Issue: 33(6), P. 060310 - 060310

Published: March 15, 2024

We redesign the parameterized quantum circuit in deep neural network, construct a three-layer structure as hidden layer, and then use classical optimization algorithms to train circuit, thereby propose novel hybrid network (HQDNN) used for image classification. After bilinear interpolation reduces original suitable size, an improved enhanced representation (INEQR) is encode it into states input of HQDNN. Multi-layer circuits are main implement feature extraction The output results converted data through measurements optimized on computer. To verify performance HQDNN, we conduct binary classification three experiments MNIST (Modified National Institute Standards Technology) set. In first classification, accuracy 0 4 exceeds 98%. Then compare with other algorithms, two datasets show that higher than general convolutional network.

Language: Английский

Enhancement of Online Education in Engineering College Based on Mobile Wireless Communication Networks and IOT DOI Open Access
Jaafar Qassim Kadhim,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(01), P. 176 - 200

Published: Jan. 10, 2023

The field of Engineering is that which needs a high level analytical thinking, intuitive knowledge, and technical know-how. area communication engineering deals with different components including, wireless mobile services, radio, broadband, web satellites. There rapid decline in the quality students produced by faculties as result sufficient methods frameworks student assessment. production high-potential engineers limited utilization old traditional education methodology frameworks. presentation estimation system institution motionless manual. Usually, assessment student’s performance using to use students’ scores, while failing evaluate their based on activities or practical applications. In addition, such systems do not take cognizance individual knowledge connects within learning environment. Recently, institutions have started paying attention evaluation solutions are networks Internet Things (IoT). Therefore, this study, an automated has been proposed for students. designed IoT aim improving process virtual education. data used study collected through sensors premises college, pre-processed normalization. After was pre-processed, it stored cloud. order enable classification activity, Adaptive Layered Bayesian Belief Network (AL-BBN) classifier work. scores calculated fuzzy logic, Multi-Gradient Boosting Decision Tree (MGBDT) decision making. python simulation tool employed implementation system, benchmarks done well. Based findings conceptual model outperformed existing ones terms online learning.

Language: Английский

Citations

73

Secure Chaos of 5G Wireless Communication System Based on IOT Applications DOI Open Access
Haider TH. Salim ALRikabi, Hussein Tuama Hazim

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2022, Volume and Issue: 18(12), P. 89 - 105

Published: Sept. 14, 2022

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A model will fulfilling needs customers simultaneously gives huge investment funds item cost convenience was presented this paper. perform steering, planned geography virtualized climate. We customized CHAOS network flood board goes about as consistent northward API directing. Network infused dynamically from 1MB up 10MB (connect b/w) progressive way similar 10 occurrences. In conclusion, performed applying control hypothetical method assistance calculations. By looking two situations, noticed prominent distinction throughput controlling application MANETs. data refreshed after clockwork.

Language: Английский

Citations

69

Gender Recognition of Human from Face Images Using Multi-Class Support Vector Machine (SVM) Classifiers DOI Open Access
Mohammed Jawad Al Dujaili, Haider TH. Salim ALRikabi, Nisreen Khalil Abed

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(08), P. 113 - 134

Published: April 26, 2023

In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering several uses it has in security, web search, human-computer interactions, etc., from facial photos garnered lot attention. The need to use enhance techniques felt more strongly today due significant development design systems. Relatively speaking other approaches, progress gained this area thus far not exceptional. Thus, novel method been adopted study improve accuracy comparison earlier research. To create best rate efficiency suggested research, we choose minimal set characteristics. Testing on FERET UTK-Face datasets reveals that our algorithm lower degree inaccuracy. article, input image person's face pre-processed extract right features once recognized. Gender separation achieved using Multi-class Support Vector Machine (SVM) Classifiers after normalized images have extracted Histogram Oriented Gradient (HOG), Gabor Filters, Speeded Up Robust Features (SURF), as well their combination select most appropriate feature them for classification. As reduction feature, Principal Component Analysis (PCA) also employed. Using proposed approach, 98.75% precision accomplished database runtime performance 0.4 Sec. database, 97.43% 0.5

Language: Английский

Citations

19

the Finger Vein Recognition Using Deep Learning Technique DOI Creative Commons

Sahar Wahab khadim,

Hussain K. Ibrahim,

Ameen Majid Shadhar

et al.

Wasit Journal of Computer and Mathematics Science, Journal Year: 2022, Volume and Issue: 1(2), P. 1 - 7

Published: June 30, 2022

Finger vein biometrics have gained a lot of attention in recent years because they offer the perfect balance security and economic viability, with advantages such as being least susceptible to identity theft veins are present beneath skin, unaffected by ageing person, etc. All these factors make it necessary create functioning models meet ever-increasing need for security. The use facial recognition AI-based biometrics, particularly law enforcement, has become hot topic its inadvertent demographic bias. Biometric bias, on other hand, far-reaching consequences that extend into daily cases. When an ATM transaction or online banking is compromised false positive negative verification, fraudulent activity made easier. study this research work focused difficulty determining fingertip. On two widely used freely available datasets finger veins, we applied deep convolutional neural network feature extraction. gotten interest recently novel biometric technique. might benefit from applying learning, end-to-end approach shown promising results sectors like face target detection.

Language: Английский

Citations

22

Investigation of Quantum Machine Learning for Smart Eco System Focusing on Energy Optimization DOI
Sajjad Hussain, Nishit Malviya, Prakash Pareek

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0

Review Vehicular Ad hoc Networks Security Challenges and Future Technology DOI Creative Commons

Haifaa Ahmed Hassan,

Sahar Wahab khadim

Wasit Journal of Computer and Mathematics Science, Journal Year: 2022, Volume and Issue: 1(3), P. 1 - 9

Published: Sept. 30, 2022

Vehicular Ad hok Networks (VANET) is an emerging technology with both a bright future and significant concerns, particularly in terms of security. This study focuses on three-part VANET security frameworks. The first gives thorough review the needs, difficulties, characteristics In order to create secure architecture effective party communication, certain needs should be taken into account. We provide information current designs as well widely used standard protocols. second concentrates brand-new categorization various assaults described literature remedies that go them. third compares few these options using established standards for VANET. Then, assist researchers usage, we call attention many outstanding topics technological obstacles linked

Language: Английский

Citations

20

Quantum neural networks for power flow analysis DOI Creative Commons
Zeynab Kaseb, Matthias Möller, Giorgio Tosti Balducci

et al.

Electric Power Systems Research, Journal Year: 2024, Volume and Issue: 235, P. 110677 - 110677

Published: July 3, 2024

This paper explores the potential application of quantum and hybrid quantum–classical neural networks in power flow analysis. Experiments are conducted using two datasets based on 4-bus 33-bus test systems. A systematic performance comparison is also among quantum, quantum–classical, classical networks. The (i) generalization ability, (ii) robustness, (iii) training dataset size needed, (iv) error, (v) process stability. results show that developed network outperforms both networks, hence can improve deep learning-based analysis noisy-intermediate-scale (NISQ) fault-tolerant (FTQ) era.

Language: Английский

Citations

4

Lean Construction Strategies Supported by Artificial Intelligence Techniques for Construction Project Management—A Review DOI Open Access

Lesly Velezmoro-Abanto,

Rocío Cuba-Lagos,

Bryan Taico-Valverde

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(03), P. 99 - 114

Published: Feb. 27, 2024

This paper analyzes the application of artificial intelligence (AI) techniques in lean construction (LC) and their potential to enhance project management (PM) for improved cost schedule efficiency. The PRISMA methodology is used select relevant articles four steps. Furthermore, a bibliometric analysis keywords occurrences conducted. study emphasizes different methods utilizing tools AI attain optimal results industry. By combining variety techniques, it possible create an environment that fosters outcomes while minimizing risks inefficiencies. According reviewed, LC its are becoming increasingly general practice (GP). Machine learning (ML) particularly neural networks (ANN), have been extensively researched as tool projects by delays, fostering collaboration, cutting costs, saving time, boosting productivity. Combining with ML can profitability align principles, leading successful projects.

Language: Английский

Citations

3

Recruitment of Teachers for Cooperative Education in Educational Institutions DOI Open Access
Huda Abbas Kanber, Suaad Hadi Hassan Al-Taai, Waleed Abood Mohammed Al-Dulaimi

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(03), P. 110 - 127

Published: Feb. 15, 2023

The study of cooperative education is important not only for researchers but also those interested in studying educational methods, such as university professors, teachers schools, and all institutions. This because its effectiveness teaching students, developing their skills, ideas employing them the finding appropriate solutions to questions posed by teacher. It helps instilling a spirit cooperation among students dividing into groups achieve desired goals. aim clarify how it use addressing educational, social psychological aspects when divided three sections. first section presents general framework dealing with problem, importance objectives. second deals concept education, date inception. discusses most theories that I mentioned about importance, results, foundations objectives including benefits, characteristics, stages strategies. clarifies role teacher student e-learning. third topic dealt methodology research presentation interpretation discussion. reached several conclusions, which are: staff institutions enjoy high level economic goals, were significant used.

Language: Английский

Citations

8

Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies DOI Open Access
Muhammad Ahmad Nawaz Ul Ghani, Kun She, Muhammad Arslan Rauf

et al.

Computers, materials & continua/Computers, materials & continua (Print), Journal Year: 2024, Volume and Issue: 79(2), P. 2609 - 2623

Published: Jan. 1, 2024

The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy the digital age.This trend is spurred by rising demand for face technology a variety industries, including access control, law enforcement, surveillance, internet communication.However, usage created serious monitoring user preferences, especially context-aware systems.In these problems, this study provides novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, distributed computing solve while maintaining exact recognition.The framework's painstaking design execution strive strike compromise between precise protecting personal integrity an increasingly interconnected environment.Using cutting-edge tools like Dlib analysis, Ray Cluster computing, Blockchain decentralized identity verification, proposed system scalable secure analysis privacy.The study's contributions include creation sustainable solution privacy-aware recognition, implementation flexible based on networks, demonstration higher performance over previous methods.Specifically, StyleGAN model outstanding accuracy rate 93.84% processing high-resolution images from CelebA-HQ dataset, beating other evaluated models Progressive GAN 90.27%, CycleGAN 89.80%, MGAN 80.80%.With improvements accuracy, speed, protection, great promise practical fields need technology.This paves way future research systems, emphasizing significance using meet issues identity.

Language: Английский

Citations

2