Preferred Language
Articles
/
2xbweocBVTCNdQwC2VOL
Facial Emotion Recognition: A Survey
...Show More Authors

Emotion could be expressed through unimodal social behaviour’s or bimodal or it could be expressed through multimodal. This survey describes the background of facial emotion recognition and surveys the emotion recognition using visual modality. Some publicly available datasets are covered for performance evaluation. A summary of some of the research efforts to classify emotion using visual modality for the last five years from 2013 to 2018 is given in a tabular form.

Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Expert Systems With Applications
A long short-term recurrent spatial-temporal fusion for myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (24)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Traitement Du Signal
A Comprehensive Review on Machine Learning Approaches for Enhancing Human Speech Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Iraqi Third Year College Students' Recognition of English Idioms: A Comparative Study
...Show More Authors

An idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.

View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Clinical and biochemical evaluation of facial acanthosis nigricans
...Show More Authors

KE Sharquie, AA Noaimi, HG Mahmood, SM Al-Ogaily, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 6

View Publication
Publication Date
Sat Nov 01 2014
Journal Name
Pigmentary Disorders
Gazelle Eye like Facial Melanosis (Clinico-Histopathological Study)
...Show More Authors

KE Sharquie, AA Noaimi, Pigmentary Disorders, 2014 - Cited by 5

View Publication
Publication Date
Tue Jan 01 2019
Journal Name
World Journal Of Dentistry
Facial Fractures in Preschool- and School-aged Children
...Show More Authors

Aim: The purpose of this study was to analyze the patterns of facial fractures in children and to compare them between preschool- and school-aged children. Materials and methods: This retrospective observational study included 57 children with facial fractures. The variables analyzed were the age of the patients—divided into a preschool-aged group (0–5 years) and a school-aged group (6–12 years)—gender, cause of trauma, the facial bones involved, the pattern of fracture, the modality of treatment used, the time between injury and treatment, and the postoperative complications. Results: The incidence of facial fractures in children ≤12 years was 30.2%. The patients consisted of 40 (70.2%) males and 17 (29.8%) females, and most pati

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (7)
Scopus
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Craniofacial Surgery
Single Session Facial Lipostructure by Using Autologous Fat Mixed With Platelet-Rich Fibrin Injected by Using Facial Autologous Muscular Injection Technique
...Show More Authors
Aim:

This study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.

Materials and Methods:

Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).

Auto

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication