Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe results of the current study showed that the liver of H. javanicus appeared as large lobulated organ divided into six distinct lobes, that filled the cranial region and little extended to the middle region of abdominal cavity. On the other hand, liver of S. carolinensis laid against the diaphragm, occupied the cranial region of the abdominal cavity and consisted of five lobes. The liver is surrounded with a thin capsule of dense regular collagenous connective tissue and few numbers of smooth muscles fibers can be seen in the capsule that covered the squirrel liver. The liver parenchyma divided into a large number of interconnected hepatic lobules marked only by the abundant amount of connective tissue bordered the triads, and within the
... Show MoreIn the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreAbstract
Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.
Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.
In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:
- Features of moderate religious discourse
- The role of moderate discourse in establishing communit
Potentiostatic polarization and weight loss methods have been used to investigate the corrosion behavior of carbon steel in sodium chloride solution at different concentrations (0.1, 0.4 and 0.6) M under the influence of temperatures ( 293, 298, 303, 308 and 313) K. The inhibition efficiency of the amoxicillin drug on carbon steel in 0.6 M NaCl has also been studied based on concentration and temperature. The corrosion rate showed that all salt concentrations ( NaCl solution) resulted in corrosion of carbon steel in varying ratio and 0.6 M of salt solution was the highest rate (50.46 g/m².d). The results also indicate that the rate of corrosion increases at a temperature of 313 K.. Potentiodynamic polarization studi
... Show MoreThe Atmospheric Infrared Sounder (AIRS) on EOS/Aqua satellite provides diverse measurements of Methane (CH4) distribution at different pressure levels in the Earth's atmosphere. The focus of this research is to analyze the vertical variations of (CH4) volume mixing ratio (VMR) time-series data at four Standard pressure levels SPL (925, 850, 600, and 300 hPa) in the troposphere above six cities in Iraq from January 2003 to September 2016. The analysis results of monthly average CH4VMR time-series data show a significant increase between 2003 and 2016, especially from 2009 to 2016; the minimum values of CH4 were in 2003 while the maximum values were in 2016. The vertical distribution of CH4<
... Show MoreAbstract Iraq has an important place in the regional and international balance, and the competition among countries has increased in rapprochement with Iraq, not only for its geography or its privileged location, but because it has many other components that make regional and international countries want to strengthen their relations with it (Regional and international powers). In addition to that, Iraq has become increasingly important for these international and regional powers after its victory over the terrorist organization (ISIS), which proved an important fact that Iraq represents the most important pillars in the international balance.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreTwenty five vaginal swabs from outpatients' healthy women were collected from Kamal Al-Samarai Hospital, Baghdad, to isolate and identify of Lactobacillus acidophilus. Three isolates were diagnosed as L. acidophilus which represents 15% of the total number of lactic acid bacterial (LAB) isolates; other LAB types represent 65% (20 isolates).The ability of L. acidophilus to produce surlactin was detected after measuring its biological activity to inhibit the adhesion of biofilm formed by Pseudomonas aeruginosa to surfaces using test tube method. It was found that all isolates were able to produce surlactin but the activity of surlactin was varying in each isolate. Surlactin produced by isolates 1 and 13 was the most effective. Biological appl
... Show More