Preferred Language
Articles
/
joe-1981
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer learning, a powerful deep learning technique that can be effectively employed to Face gender classification using the Alex-Net architecture. The performance evaluation of the proposed gender classification model encompassed three datasets: the LFW dataset, which contained 1,200 facial images. The Faces94 dataset contained 400 facial images, and the family dataset had 400. The Transfer Learning with the Alex-Net model achieved an accuracy of 98.77% on the LFW dataset.

Furthermore, the model attained an accuracy rate of 100% on both the Faces94 and family datasets. Thus, the proposed system emphasizes the significance of employing pre-processing techniques and transfer learning with the Alex-Net model. These methods contribute to more accurate results in gender classification. Where, the results achieved by applying image contrast enhancement techniques, such as HE and CLAHE, were compared. CLAHE achieved the best facial classification accuracy compared to HE.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Performance Analysis of Four Conceptual Designs for the Air Based Photovoltaic / Thermal Collectors
...Show More Authors

The  thermal  and  electrical  performance  of  different  designs  of  air  based  hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and lower surfaces of PV panels, air temper

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
PROBLÉMATIQUE DE L’ENSEIGNEMENT DE LA TRADUCTION ET PROLÈMES DE SON APPRENTISSAGE DANS UNE CLASSE DE LANGUE The problem in teaching Translation and problems of its learning in a language lesson
...Show More Authors

Le présent travail aborde la question de l’enseignement de traduction en tant que matière faisant partie du programme élaboré dans des Départements de Français au sein de certaines universités irakiennes, en particulier celle de Bagdad. La méthode d’enseigner suivie constitue une véritable problématique qu’on a bien diagnostiquée à partir de quelques années d’expériences, à la lumière des observations faites dans des cours de traduction professionnelle, et dans la perspective des citations et témoignages établies par des traductologues et pédagogues et principalement par Marianne LEDERER qui a établi la Théorie Interprétative de la traduction. Mais pourquoi l’enseignement lui-même poserait une telle probl

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use Dividend Discount Model , DDM in Stocks Valuation With Framework of Inflation: An Applied Study
...Show More Authors

The theme of this Study presents analysis and discuss to the "Share the framework for assessing inflation," a practical study in a sample of joint stock companies listed on the Iraq Stock Exchange for the years (2009-2013). To determine the extent of the disparity between the nominal value of shares (Nominal Value) before deducting inflation and the real value (Real Value) per share, after deducting inflation in the case of zero growth. The study relied on annual reports of the companies of the research sample of the Iraq Stock Exchange, as well as the Iraqi Securities Commission. Besides the annual reports issued by the Ministry of Planning, as well as annual reports and statistical bulletin issued by the Central Bank of Iraq. It is fra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
On The Dynamical Behavior of a Prey-Predator Model With The Effect of Periodic Forcing
...Show More Authors

The dynamical behavior of a two-dimensional continuous time dynamical system describing by a prey predator model is investigated. By means of constructing suitable Lyapunov functional, sufficient condition is derived for the global asymptotic stability of the positive equilibrium of the system. The Hopf bifurcation analysis is carried out. The numerical simulations are used to study the effect of periodic forcing in two different parameters. The results of simulations show that the model under the effects of periodic forcing in two different parameters, with or without phase difference, could exhibit chaotic dynamics for realistic and biologically feasible parametric values.

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref
Publication Date
Mon Jul 05 2010
Journal Name
Evolutionary Algorithms
Variants of Hybrid Genetic Algorithms for Optimizing Likelihood ARMA Model Function and Many of Problems
...Show More Authors

Optimization is essentially the art, science and mathematics of choosing the best among a given set of finite or infinite alternatives. Though currently optimization is an interdisciplinary subject cutting through the boundaries of mathematics, economics, engineering, natural sciences, and many other fields of human Endeavour it had its root in antiquity. In modern day language the problem mathematically is as follows - Among all closed curves of a given length find the one that closes maximum area. This is called the Isoperimetric problem. This problem is now mentioned in a regular fashion in any course in the Calculus of Variations. However, most problems of antiquity came from geometry and since there were no general methods to solve suc

... Show More
Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Comparative Medicine
Model of traumatic spinal cord injury for evaluating pharmacologic treatments in cynomolgus macaques (Macaca fasicularis)
...Show More Authors

Here we present the results of experiments involving cynomolgus macaques, in which a model of traumatic spinal cord injury (TSCI) was created by using a balloon catheter inserted into the epidural space. Prior to the creation of the lesion, we inserted an EMG recording device to facilitate measurement of tail movement and muscle activity before and after TSCI. This model is unique in that the impairment is limited to the tail: the subjects do not experience limb weakness, bladder impairment, or bowel dysfunction. In addition, 4 of the 6 subjects received a combination treatment comprising thyrotropin releasing hormone, selenium, and vitamin E after induction of experimental TSCI. The subjects tolerated the implantation of the recording devi

... Show More
Scopus (6)
Scopus
Publication Date
Tue Apr 26 2011
Journal Name
Evolutionary Algorithms
Variants of Hybrid Genetic Algorithms for Optimizing Likelihood ARMA Model Function and Many of Problems
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
USE OF MODIFIED MAXIMUM LIKELIHOOD METHOD TO ESTIMATE PARAMETERS OF THE MULTIPLE LINEAR REGRESSION MODEL
...Show More Authors

Scopus