Preferred Language
Articles
/
exeVPo8BVTCNdQwCNGWb
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes into account the majority of the challenges faced by existing methods of age estimate. Making use of the data set that serves as the foundation for the face estimation system in this region (IMDB-WIKI). By performing preparatory processing activities to setup and train the data in order to collect cases, and by using the CNN deep learning method, which yielded results with an accuracy of 0.960 percent, we were able to reach our objective.

Scopus
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison for estimation methods for the autoregressive approximations
...Show More Authors

Abstract

      In this study, we compare between the autoregressive approximations (Yule-Walker equations, Least Squares , Least Squares ( forward- backword ) and Burg’s (Geometric and Harmonic ) methods, to determine the optimal approximation to the time series generated from the first - order moving Average non-invertible process, and fractionally - integrated noise process, with several values for d (d=0.15,0.25,0.35,0.45) for different sample sizes (small,median,large)for two processes . We depend on figure of merit function which proposed by author Shibata in 1980, to determine the theoretical optimal order according to min

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Estimation of Volumetric Mass Transfer Coefficient in Bioreactor
...Show More Authors

 

This study is concentrated to investigate the effects of aeration and stirring speed on the volumetric mass transfer coefficient (KLa). A dynamic technique was used in estimating KLa values in order to achieve the aim of this study.

This study was done in 10L bioreactor by using two medias:-

  1. Dionized water
  2. Xanthan solution (1 g /L)

Moreover, the research covered a comparison between the obtained values of KLa.

The Xanthan solution was used because of its higher viscosity in comparison with water. It behaves similarly to the cultivation medium when organisms are cultivated in a bioreactor. Growth of organisms in the reactor l

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Jun 17 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Estimation the Safety of Parenteral Resveratrol in Mice
...Show More Authors

   Resveratrol is polyphenolic compound has many biochemical and biological effects on several organs. Therefore, resveratrol can be used to treat many diseases. The aim was to evaluate resveratrol safety when used in a parenteral single bolus dose. This study was conducted on 60 mice (30 males and 30 females). Each male and female mice divided into 6 groups (five mice per group). All mice groups given 1% DMSO and five different doses of resveratrol (5, 2.5, 1.25, 0.625, 0.312) gm/kg intraperitonially given to five groups respectively. The mice were continuously monitored during 14 days. The number of deaths, changes in general behavior, changes in physiological activity, and signs of toxicity were reported. On day 15 blood was

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Fri Jun 02 2023
Journal Name
East European Journal Of Physics
Reevaluation Body Weight and Age with Standardized Uptake Value in the Liver Cancer for [18F] FDG PET/CT
...Show More Authors

Standardized uptake values, often known as SUVs, are frequently utilized in the process of measuring 18F-fluorodeoxyglucose (FDG) uptake in malignancies . In this work, we investigated the relationships between a wide range of parameters and the standardized uptake values (SUV) found in the liver.  Examinations with 18F-FDG PET/CT were performed on a total of 59 patients who were suffering from liver cancer. We determined the SUV in the liver of patients who had a normal BMI (between 18.5 and 24.9) and a high BMI (above 30) obese. After adjusting each SUV based on the results of the body mass index (BMI) and body surface area (BSA) calculations, which were determined for each patient based on their height and weight. Under a variety of dif

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Simulation of five methods for parameter estimation and functionExponential distribution reliability
...Show More Authors
The estimation process is one of the pillars of the statistical inference process as well as the hypothesis test, and the assessment is based on the collection of information and conclusions about the teacher or the community's teachers on the basis of the result
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Natural And Applied Sciences Ural
Electron Microscope Study of Human Cerebral Cortex (Left Superior Temporal Gyrus), in Different Age Groups and Gender Electron Microscope Study of Human Cerebral Cortex (Left Superior Temporal Gyrus), in Different Age Groups and Gender
...Show More Authors

Human cerebral cortex is the outer folded neuronal layer and represents major part of the cerebrum with enormous functions. It is a laminar structure, easily visualized grossly. Previous studies showed that the Superior Temporal gyrus is one of the thickest cerebral cortex regions, reaching (about 4 mm). The Electron microscope study was made on 6 samples taken to measure the neuronal soma dimension of the large pyramidal cells present in the internal pyramidal cortical layer V in different age groups and gender. Aging process was obvious on the large pyramidal cells of the cerebral cortex, in which their neuronal soma dimensions showed shrinkage with age progression. But statistically there was no differences in the values between males an

... Show More
View Publication