Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as DCT, DWT, DFT, PCA, LBP, SURF, SIFT, etc., or deep learning techniques such as CNN, DNN, Alex Net CNN, VGG-16, SVM, Squeeze Net, Google Net, MobileNetV2, etc. The effort will make it easier for researchers, especially those who are new to the field, to have a brief understanding of the trend of employing deep learning in a trustworthy biometric for the identification and recognition of human identification.
Cryptosporidiosis is an intestinal protozoan parasitic disease that infects human and animals, caused by apicomplexan parasite belong to the genusof Cryptosporidium. The current study was done to record the infection rate of cryptosporidiosis in human and cattle, and genotype the clinical isolates of Cryptosporidium in Baghdad Province. A total of 265 stool sample were collected (150 from human and 115 from cattle) during the period from December 2016 to the May 2017. Cryptosporidial infection was detected using modified acid fast stain. DNA of the parasite was extracted from oocysts of positive fecal samples and nested PCR method was used for partial 60 kDa glycoprotein (gp60) gene amplification then sequence analysis for selected samples.
... Show MoreThe application of physiological oxygen (physoxia) concentrations is becoming increasingly commonplace within a mammalian stem cell culture. Human mesenchymal stem cells (hMSCs) attract widespread interest for clinical application due to their unique immunomodulatory, multi-lineage potential, and regenerative capacities. Descriptions of the impact of physoxia on global DNA methylation patterns in hMSCs and the activity of enzymatic machinery responsible for its regulation remain limited. Human bone marrow-derived mesenchymal stem cells (BM-hMSCs, passage 1) isolated in reduced oxygen conditions displayed an upregulation of SOX2 in reduced oxygen conditions vs. air oxygen (21% O2, AO), while no change was noted for either OCT-4 or NA
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show MoreThis study aimed to evaluate the IHC expression of CDX2 protein in HGC patients and control groups and also to study the correlation between IHC expression of the CDX2 and different clinicopathological variables such as: age, gender, histopathological subtype, grade, and stage of the tumor in HGC cases. the retrospectively sectional study for the period from 2014 to 2018 included a total of 60 formalin fixed paraffin embedded blocks of the HGC tissue (partial or total gastrectomy specimens) that collected from the archived materials of the Department of Pathology of Baghdad Teaching Hospital and the Center of Gastrointestinal and Hepatic Diseases, and also some samples were collected from other private laboratories. The IHC expression of th
... Show MoreThe effect of smoking, age and exposure duration in pesticide risk groups were studied > Groups were all men and included farmers (25), pesticide sellers (25), pesticides manufacture workers (Al-Tark factory for agricultural pesticide production) (25), Control group (25) were from Baghdad university staff (living in Baghdad city) > The cytogenetic parameters studied were Chromosomal aberrations (CA), induction of micronuclei (Mn)formation .Results revealed that smoking synergized pesticides exposure in induction of structural CAs in all groups with significant differences (P<0.01) and the worst effect recorded in workers , the increment was more than folds the level of control group (0.68) for the non smokers and was 5.78 times (control gr
... Show MoreThe present work is devoted to investigate the performance of a homemade Y-shape catalytic microreactor for degradation of dibenzothiophene (DBT), as a model of sulphur compounds including in gas oil, utilizing solar incident energy. The microchannel was coated with TiO2 nanoparticles which were used as a photocatalyst. Performance of the microreactor was investigated using different conditions (e.g., DBT concentration, LHSV, operating temperature, and (H2O2/DBT) ratio). Our experiments show that, in the absence of UV light, no reaction takes place. The results revealed that outlet concentration of DBT decreases as the mean residence time in the microreactor increases. Also, it was noted that operating temperature s
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show More