One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.
Aeromonas hydrophila have been isolated as a cause of a cute gastroenteritis in 23 (5.6%) of 410 patients. Other bacterial enteropathogens have been isolated from 387 patients with diarrhea, were 19 different strains. A. hydrophila occurred more commonly in children with acute diarrhea, the results showed that 18(78.26%) isolates of A. hydrophila found in children under 10 years old ,distributed to 10(43.47%) in male and 8(34.78%) in female ,and in adults with diarrhea 5 (21.73%). In the other hand, we noticed frequency of isolation was higher in male 14(60.86%) when compared with 9(39.14%) in female. Six strains of A. hydrophila have been observed to have bacteriocin activity against 12 of 23 different A. hydrophila ,as well as Staphy
... Show MoreRare earth elements (Cerium, Lanthanum and Neodymium) doped CdS thin films are prepared using the chemical Spray Pyrolysis Method with temperature 200 oC. The X-ray diffraction (XRD) analysis refers that pure CdS and CdS:Ce, CdS:La and CdS:Nd thin films showed the hexagonal crystalline phase. The crystallite size determined by the Debye-Scherrer equation and the range was (35.8– 23.76 nm), and it was confirmed by field emission scanning electron microscopy (FE-SEM). The pure and doped CdS shows a direct band gap (2.57 to 2.72 eV), which was obtained by transmittance. The room-temperature photoluminescence of pure and doped CdS shows large peak at 431 nm, and two small peaks at (530 and 610 nm). The Current – voltage measurement in da
... Show MoreObjectives: The study aims to investigate the efficiency of physiotherapy methods to improve the
degree of the clinical recovery of the peripheral facial palsy.
Methodology: This study is carried out at the Rehabilitation Center-Baghdad from November 2009 till
March 2010. This study includes (40) patient, their ages are from (13) to (55) years old; (24) male and
(16) female with unilateral facial palsy of undetermined cause. House-Brackmann facial recovery
scores have been used before and after the physiotherapy treatment.
Results: The results show that the physiotherapy sessions obtained the best effect of the electrical
stimulation, exercises and massage in the treatment of facial palsy. Highly respondents in femal
Fraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreAbstract
The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg
... Show MoreBackground: This in vitro study evaluated the effect of canal dryness and flaring on the accuracy of two electronic apex locators for working length (WL) determination. Materials and methods: Sixty extracted teeth were used, after access opening was done, the occlusal surface was flattened to create stable reference point. The teeth were randomly divided into two equal main groups of flared and unflared group each one of 30 teeth. The flaring was done with Gates Glidden drills. The two main groups were further subdivided into two subgroups: dry canal and wet canal using 5.25% sodium hypochlorite groups, Electronic WL of each sample was determined using both Root ZX and i-Root apex locator. Consequently, histologic WL was determined by shav
... Show MoreAbstract: Reflection optical fibre Humidity sensor is presented in this work, which is based on no core fibre prepared by splicing a segment of no core fibre (NCF) at different lengths 1-6 cm with fixed diameter 125 µm and a single mode fibre (SMF). The range of humidity inside the chamber is controlled from 30% to 90% RH at temperature ~ 30 °С. The experimental result shows that the resonant wavelength dip shift decreases linearly with an increment of RH% and the sensitivity of the sensor increased linearly with an increasing in the length of NCF. However, a high sensitivity 716.07pm/RH% is obtained at length 5cm with good stability and reputability. Furthermore, the sensor is shif
... Show More