Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main steps, at first data augmentation is done by making multiple copies of the input image then perform out-of-plane rotation on them around all the X,Y and Z axes. Then a new fast extract Region of Interest (ROI) algorithm is proposed for cropping palm region. Finally, features are extracted and classified by specific structure of Convolutional Neural Network (CNN). The system is tested on two public multispectral palm vein databases (PolyU and CASIA); furthermore, synthetic datasets are derived from these mentioned databases, to simulate the hand out-of-plane rotation in random angels within range from -20° to +20° degrees. To study several situations of pose invariant, twelve experiments are performed on all datasets, highest accuracy achieved is 99.73% ∓ 0.27 on PolyU datasets and 98 % ∓ 1 on CASIA datasets, with very fast identification process, about 0.01 second for identifying an individual, which proves system efficiency in contactless palm vein problems.
Background: The present article is concerned within the scope of Forensic Medicine, specifically Forensic Genetics. The case was taken care of in the Genetic-Molecular Laboratory of the Odessa Regional Bureau of Forensic-Medical Examinations, in Ukraine, during January and February of 2014.
Objectives: The aim of our work was to identify an unknown person, using the techniques: Y-chromosome markers and mitochondrial DNA typing.
Materials and methods: The materials available for our procedure were: pieces of tissue in paraffin blocks, saved from the corpse of the unknown person; blood from a living male subject, who claimed to be the grandfather, and from two females, allegedly the sisters. From all of them we extracted nuclear DNA
Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay
... Show MoreIron is one of the abundant elements on earth that is an essential element for humans and may be a troublesome element in water supplies. In this research an AAN model was developed to predict iron concentrations in the location of Al- Wahda water treatment plant in Baghdad city by water quality assessment of iron concentrations at seven WTPs up stream Tigris River. SPSS software was used to build the ANN model. The input data were iron concentrations in the raw water for the period 2004-2011. The results indicated the best model predicted Iron concentrations at Al-Wahda WTP with a coefficient of determination 0.9142. The model used one hidden layer with two nodes and the testing error was 0.834. The ANN model coul
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreThe physical sports sector in Iraq suffers from the problem of achieving sports achievements in individual and team games in various Asian and international competitions, for many reasons, including the lack of exploitation of modern, accurate and flexible technologies and means, especially in the field of information technology, especially the technology of artificial neural networks. The main goal of this study is to build an intelligent mathematical model to predict sport achievement in pole vaulting for men, the methodology of the research included the use of five variables as inputs to the neural network, which are Avarage of Speed (m/sec in Before distance 05 meters latest and Distance 05 meters latest, The maximum speed achieved in t
... Show MoreThe digital image with the wavelet tools is increasing nowadays with MATLAB library, by using this method based on invariant moments which are a set of seven moments can be derived from the second and third moments , which can be calculated after converting the image from colored map to gray scale , rescale the image to (512 * 512 ) pixel , dividing the image in to four equal pieces (256 * 256 ) for each piece , then for gray scale image ( 512 * 512 ) and the four pieces (256 * 256 ) calculate wavelet with moment and invariant moment, then store the result with the author ,owner for this image to build data base for the original image to decide the authority of these images by u
... Show MoreThis paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward
... Show More