Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and overlapping kitchen utensils from internet were used as base benchmark objects. The evaluation and training/validation sets are set at 20% and 80% respectively. This project evaluated the performance of these techniques and analyzed their strengths and speeds based on accuracy, precision and F1 score. The analysis results in this project concluded that the YOLOv5 produces accurate bounding boxes whereas the Faster R-CNN detects more objects. In an identical testing environment, YOLOv5 shows the better performance than Faster R-CNN algorithm. After running in the same environment, this project gained the accuracy of 0.8912(89.12%) for YOLOv5 and 0.8392 (83.92%) for Faster R-CNN, while the loss value was 0.1852 for YOLOv5 and 0.2166 for Faster R-CNN. The comparison of these two methods is most current and never been applied in overlapping objects, especially kitchen utensils.
We have studied in this research litter (Taa) a morphological , sonic indicative and comparative study among four Semitic languages. They are Arabic , Hebrew, Syriac and Akkadian languages . We have divided the research into a number of pivots beginning with an entrance about the letter (Taa) in Semitic languages and the symbols which are used by these languages referring to . Then we have studied (Taa) from sonic side with letters phenomenon (b, g, k, p, t) the six in both Hebrew and Syriac languages . The letter (Taa) is formed one of them and the sonic change that is happening in articulation (Taa) according to sonic rules related to these letters in case of emphasis or in case of neglected (not emphasis). Then we have studied the pro
... Show MoreIts well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.
Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreEmotion could be expressed through unimodal social behaviour’s or bimodal or it could be expressed through multimodal. This survey describes the background of facial emotion recognition and surveys the emotion recognition using visual modality. Some publicly available datasets are covered for performance evaluation. A summary of some of the research efforts to classify emotion using visual modality for the last five years from 2013 to 2018 is given in a tabular form.
The research deals with an important issue that many people are working on, namely the sanctification of the texts on which the timings of the time and the different conditions of the place took place. Do not live up to the ranks of perfection and perfection, and every effort has explanations according to the mind machine, which is not protected by infallibility from error. The great downfall is to put these intellectual efforts in the Bible without separating them from the Word of God. The situation and the place on the adherents of a religion and mixed with the trick of the average individual only to be subject to the words of the teachers of Sharia and docility.
Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreThe monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non
... Show More