Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. To reduce the number of generated sub-graphs, overlap ratio metric is utilized for this purpose. After encoding the final selected sub-graphs, binary classification is then applied to classify the emotion of the queried input facial image using six levels of classification. Binary cat swarm intelligence is applied within each level of classification to select proper sub-graphs that give the highest accuracy in that level. Different experiments have been conducted using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the final system accuracy was 90.00%. The results show significant accuracy improvements (about 2%) by the proposed system in comparison to current published works in SAVEE database.
In this research, new series of Furo-2-quinolone [FQ] compounds have been synthesized. These novel [FQ] compounds were prepared from coumarin derivatives (Furocoumarins: psoralen and isopsoralen).Identifications of these FQ compounds were performed by using infrared spectrum (I.R), Ultraviolet spectrum (U.V) and Nuclear Magnetic Resonance spectrum (H1-NMR) besides some physical data. The cytotoxic screening involves ;using HEP-2 cell line which gave differential responses against tested compounds : 4,6 Dimethyl furo[2, 3-g] coumarin (C1), 1-(2`, 4`, Dimethoxy benzylideneimino)-2,6-dimethyl Furo [2, 3-g] quinoline-2-one (C3) and the angular psoralen of the same derivative
... Show MoreIn our research novel schiff bases of imides moiety have been synthesized . Novel Schiff base derivatives of imides moiety have been synthesized by multistep reaction . First step involves prepare 2-amino -5-mercapto-1,3,4-thiadiazole (I) by the cyclization of thiosemicarbazide with carbon disulphide and anhydrous sodium carbonate in ethanol as a solvent . Then , compound (I) was reacted with phthalic anhydride in the presence of glacial acetic acid to give 2-(5-mercapto-1,3,4-thiadiazol-2-yl) isoindoline-1,3-dion (II).Compound (II)was heated with ethyl chloracetate in the presence of potassium carbonatproduced ethyl 2(5-(1,3-dioxoisoindoline -2-yl)-1,3,4-thiadiazole-2-yl thio) acetate (III).The reaction of compo
... Show MoreThe research aim was to observe the distribution pattern of
Electrospun nanofiber membranes are employed in a variety of applications due to its unique features. the nanofibers' characterizations are effected by the polymer solution. The used solvent for dissolving the polymer powder is critical in preparing the precursor solution. In this paper, the Polyacrylonitrile (PAN)-based nanofibers were prepared in a concentration of 10 wt.% using various solvents (NMP, DMF, and DMSO). The surface morphology, porosity, and the mechanical strength of the three prepared 10 wt.% PAN-based nanofibers membranes (PAN/NMP, PAN/DMF, and PAN/DMSO) were characterized using the Scanning Electron Microscopy (SEM), Dry-wet Weights method, and Dynamic Mechanical Analyzer (DMA). Using DMF as a solvent resulted in a lon
... Show MoreA variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More