Preferred Language
Articles
/
bsj-9698
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Oriented Gradients) is utilized to extract from the images. In addition, the Binarized Genetic Algorithm (BGA) is utilized as a features selection in order to select the most effective features of HOG. Random Forest (RF) functions as a classifier to categories facial emotions in people according to the image samples. The facial human examples of photos that have been extracted from the Yale Face dataset, where it contains the eleven human facial expressions are as follows; normal, left light, no glasses, joyful, centre light, sad, sleepy, wink and surprised. The proposed system performance is evaluated relates to accuracy, sensitivity (i.e., recall), precision, F-measure (i.e., F1-score), and G-mean. The highest accuracy for the proposed BGA-RF method is up to 96.03%. Besides, the proposed BGA-RF has performed more accurately than its counterparts. In light of the experimental findings, the suggested BGA-RF technique has proved its effectiveness in the human facial emotions identification utilizing images.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
Regionalism Hegemony of Political Life in Tunisia and its influence upon construction of Political System
...Show More Authors

The topic area of that’s paper dealing with regionalism hegemony upon ruling affairs and political life in Tunisia, this phenomena had historical origins, even before region of French occupation in 1881, after independence, the regionalism domination was practice and normal, the political system justified it's with many causes, like level of education, connection with Western civilization, enlighten intelligent, economic conditions in coast region and North of Tunisia compared with the South, also the role of President Bourqiba as founder of Modern Tunisia, he was from Monster (North of country) which was dominated as charismatic leader dedicate the regionalism domination through decades, yet after revolution in 2011, little changes ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
العوامل المؤثرة على اختيار موقع المشروع الصناعي وأثر ذلك على تلوث البيئة
...Show More Authors

There is no doubt though all endemic industrial must be accompanied by environmental contamination problem that is closely linked increased industrial activity on the one hand and increase the size of the problem put this industrial waste on the other, and therefore the risk to natural resources and ecosystems as a result of the presence of development projects (especially industrial ones) so it was There must be a sound footing for the sitting of industrial zones and see how their commitment to the appropriate conditions to preserve the environment and enact strict laws to achieve this and prepared well prepared to avoid the numerous errors at the social, economic and technical, environmental and health.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 25 2021
Journal Name
Caai Transactions On Intelligence Technology
Shoulder girdle recognition using electrophysiological and low frequency anatomical contraction signals for prosthesis control
...Show More Authors

View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Adding Carboxymethyl Cellulose and Zinc Sulfate on the Corrosion Characteristics of the Drilling Fluid
...Show More Authors

Drilling solutions can be considered as an intricate mixture comprising of number of chemical additives which aid specific needs such as controlling the rheological properties and reducing corrosion. Inhibitors are substances that are added in small concentrations to corrosive environment to decrease the corrosion. Their applications can be found in drilling equipments. The effect of adding Zinc Sulphate and Carboxymethyl Cellulose to study their influence on the corrosion of carbon steel in Bentonite mud has been evaluated using Weight Loss Technique. This study focuses on determining rheological properties and corrosion characteristics. Results show CMC and ZnSO4 work as inhibitors when added to the Bentonite with inhibition

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Effect Of Polar Component(1-Propanol) On The Relative Volatility Of The Binary System N-Hexane - Benzene
...Show More Authors

Vapor-liquid equilibrium data are presented for the binary systems n-hexane - 1-propanol, benzene - 1-propanol and n-hexane – benzene at 760 mm of mercury pressure. In addition ternary data are presented at selected compositions with respect to the 1-propanol in the 1-propanol, benzene, n-hexane system at 760 mmHg. The results indicate the relative volatility of n-hexane relative to benzene increases appreciably with addition of 1-propanol.

View Publication Preview PDF