The process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIts well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreVegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a
... Show MoreA Photo Dynamic Therapy (PDT) is a technique which is used with Laser to treat many of cancer
tissues. This paper deals with the relatively new therapeutic technique (PDT) with pulsed Nd:glass Laser
which was applied to human soft tissues (Ovary and Kidney tissues), and to the hard tissues (freshly
extracted human teeth), with power density of 280 watt/mm2 and exposure time 330 usec. Different
dyes (Blue, methylene, eosin, and orange) were applied to the area before irradiation to study the effect
of the pigments on the laser interaction with biological tissues. The zone of treatment (Z-necrosis) with
aid of MATLAB was determined. The relationship of zone of treatment with exposure time,
accumulated damage and fracti
KE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22
spider veins are clusters of Ectatic venules & are common finding on the lower limbs generally believed to be caused by multiple factors, including genetic predisposition, hormonal factors, gravity, occupation, pregnancy, becoming increasingly apparent with age, and trauma. Therapeutic options include sclerotherapy, surgical procedures, and treatment with different laser systems.
Objectives: The purpose of the study was to evaluate the efficacy and safety of long pulsed (Nd:YAG) laser emitting at 1064nm in the treatment of spider veins.
Patients, Materials and Methods: This prospective study was done in the laser medicine research clinics of the Institute of las
... Show More