Preferred Language
Articles
/
_kKR95kBMeyNPGM3dLof
Utilizing Energy-Efficient Deep Learning Technique for Age Estimation Through a Hybrid Methodology
...Show More Authors

This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduced by using an algorithm that calculates the predicted value. The utilization of machine learning models that have been trained on massive datasets, the implementation of strategies for correct face alignment, and the utilization of expected value regression formulations have all been significantly incorporated into the suggested approach. The model’s performance is optimized and improved in this study by utilizing several distinct classifiers, increasing the effectiveness of explicit expectations. We aimed to optimize the selection of classifiers to minimize energy consumption while achieving a mean absolute error of 2.08 (average) and a power usage of 2700 W.

Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Opcion, Año
Active Learning And Creative Thinking
...Show More Authors

Active Learning And Creative Thinking

Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
The Expression of Epstein-Barr virus in Breast cancer in relation to age
...Show More Authors

Background: Breast cancer is the most common
malignancy affecting females worldwide. The association
of Epstein-Barr virus (EBV) with this cancer is a longstanding
interest to this field.
Aim: to investigate the presence of EBV in breast tumor
tissue in relation to age.
Patients and Methods: Paraffin-embedded tissue blocks
from 45 female patients with breast tumors (ranged in age
from 28 to 85 years) were retrieved. The cases were
grouped into two categories: group (A): included 30 cases
with breast carcinoma and group (B): included 15 cases
with benign breast diseases as a control group .The
expression of EBV protein was examined
immunohistochemically.
Results: Twelve (40%) of the 30 breast canc

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 02 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Bone density determination for the maxilla and the mandible in different age groups by using computerized tomography (Part I)
...Show More Authors

Background: Mini implant stability is primarily related to local bone density; no studies have evaluated bone density related to mini implant placement for orthodontic anchorage between different age groups in the maxilla and the mandible. The present research aims to evaluate side, gender, age, and regional differences in bone density of the alveolar bone at various orthodontic implant sites. Materials and method: Fifty three individuals who were divided into two groups according to their age into: group I (ages 16-20 years) and group II (ages 21-29 years) had subjected to clinical examination, then 64-multislice computed tomography scan data were evaluated and bone density was measured in Hounsfield unit at 102 points (51 in the maxilla

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The awareness degree of teacher students in Arabic language department and their supervisors at Al-aqsa University for their future role in knowledge age
...Show More Authors

The study aimed to identify the awareness degree of teacher students in the department of Arabic language and their supervisors at Al-aqsa University for their future roles in the age of knowledge. To achieve this objective, descriptive- analytical approach was used. The instruments of this study were two questionnaires: first one consist of (20) item for teacher students, and the second consist of (27) item for educational supervisors which covered three roles: professional, technological, and humanitarian. The sample was (120) student selected randomly, and (39) supervisors of Arabic language. The result revealed that the mean of degree awareness of teacher students and their supervisors of future role are (3.857), (3.472) respectively

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Building a High Accuracy Transfer Learning-Based Quality Inspection System at Low Costs
...Show More Authors

      Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.

  &nbsp

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref