Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThe aim of this research is to design and construct a
semiconductor laser range finder operating in the near infrared range
for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of wavelength
0.904 μm with a beam expander and the receiver; a silicon pin
detector biased to approve the fast response time with it's collecting
optics. The transmitters pulse width was 200ns at a threshold current
of 10 Ampere and maximum operating current of 38 Ampere. The
repetition rate was set at 660Hz and the maximum operating output
power was around 1 watt. The divergence of the beam was 0.268o
the efficiency of the laser was 0.03% at a duty cycle of 1.32x
The current research contains four chapters. The first topic included the methodological framework that included the problem of research and the need for it, and then the importance of the research, and then the aim of the research, its limits and the definition of terms linguistically, conventionally and procedurally. The second chapter (the theoretical framework) contained two topics, the topic The first is titled: The Outward Vision in Child Theater Performances, while the second topic was titled: Presentation Technology in Child Theater, Chapter Four (Research Procedures), which organized the research community and analyzed its sample, and the fourth chapter contained research results, conclusions and recommendations. The prop
... Show MoreThis paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show Moreقال احد المربين ( أعطوني طفولة سعيدة ممتلئة وخذوا شباباً ناضجاً سليماً) ويعني بالطفولة السعيدة تلك الطفولة المشبعة بالحب والحنان وتلبية الحاجات المهمة للطفل حيث يتعلم الطفل من احضان العائلة بعض النواهي والاوامر حتى اذا اتسعت دائرة معارفه شملت الرفقة والعصبة حيث يبدأ الطفل بالتحرر شيئاً فشيئأ من الضوابط العائلية وينتقل مركز ولائه واخلاصه من العائلة الى العصبية وكلما تتوسع علاقات الطفل تزداد خبراته وت
... Show Moreأن الأسلوب الوصفي للبحث في طبيعة حق حرية الرأي والتعبير للفرد قد لايقودنا الى فهم طبيعة هذا الحق والمسؤولية المترتبة عليه كما هو الحال في الأسلوب التجريبي التحليلي ، لأننا لسنا بصدد دراسة حالات شاذة للأراء والتعابير والسلوكيات ، ولكننا بصدد دراسة طبيعة المؤثرات البايلوجية والنفسية والذاتية والنفسية الأجتماعية التي توصل الأختلاف في الرأي والتعبير الى مستوى حقاً من حقوق الحرية الطبيعية للفرد ،
... Show MoreMagic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).