Claim Missing Document
Check
Articles

Found 2 Documents
Search

An Analytical Study on the Most Important Methods and Data Sets Used to Identify People Through ECG: Review Abdullah Najm Abed Alzaki; Mohammed Al-Tamimi
Journal of Applied Engineering and Technological Science (JAETS) Vol. 5 No. 2 (2024): Journal of Applied Engineering and Technological Science (JAETS)
Publisher : Yayasan Riset dan Pengembangan Intelektual (YRPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37385/jaets.v5i2.3992

Abstract

The electrocardiogram is a topic of great importance from a medical and biometric perspective, especially recently, as researchers have begun to search for new biometric methods other than the palm print, fingerprint, or iris as alternative systems. Researchers discovered that ECG has unique features that are not common among humans, making it a good topic for researchers in biometric systems for identifying people. In this research paper, the goal is to shed light on the most important basic concepts that are related to ECG in terms of the methods used by researchers and in terms of the most critical data sets used by researchers, and also to shed light on some previous studies that achieved a high rate of citations, and also to shed light on the most important basic concepts that make Its features are unique and intelligence methods can be used effectively.
The Role of Artificial Intelligence in Providing People With Privacy: Survey Salar Raees; Mohammed Al-Tamimi
Journal of Applied Engineering and Technological Science (JAETS) Vol. 5 No. 2 (2024): Journal of Applied Engineering and Technological Science (JAETS)
Publisher : Yayasan Riset dan Pengembangan Intelektual (YRPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37385/jaets.v5i2.4013

Abstract

Images privacy involves assessing the amount of information leakage from images, assessing risks associated with identification, and examining controls on this information. It was discussed various types of protection available and most commonly used in providing privacy to a person in images, including single-stage and two-stage detection algorithms. The results of each algorithm are organized in detailed tables, and the [YOLO] algorithm expands on all versions. The paper also clarifies the dataset used for testing the algorithms and its relevance to achieving desired results. It presents a comprehensive understanding of the process of detecting persons in digital images and assesses various tools and algorithms for recognizing persons, faces, and identities. It added an extensive examination of the several methods used to identify persons in digital images, with a specific emphasis on safeguarding their privacy. The task at hand is assessing various face recognition and identification tools and algorithms, with a specific emphasis on those that exhibit superior accuracy and efficiency in presenting outcomes. The study concluded that using the yolov8 algorithm in conjunction with blurring techniques effectively conceals individuals' information in digital images while maintaining the integrity of the overall image. The research paper's implications and information can practically contribute to the development of algorithms for detecting and protecting people in digital images, as well as the development of applications in this field. Theoretically, it can enhance understanding of the process of detecting and protecting people, and potentially contribute to the development of new theories in the field of protection and discovery.