Preferred Language
Articles
/
exeVPo8BVTCNdQwCNGWb
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes into account the majority of the challenges faced by existing methods of age estimate. Making use of the data set that serves as the foundation for the face estimation system in this region (IMDB-WIKI). By performing preparatory processing activities to setup and train the data in order to collect cases, and by using the CNN deep learning method, which yielded results with an accuracy of 0.960 percent, we were able to reach our objective.

Scopus
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
New records of planktonic foraminifera in the Shuaiba Formation (Aptian Age), Mesopotamian plain, South of Iraq
...Show More Authors

Shuaiba Formation is an important formation in Iraq, because of their deposition in the important period during the geological history of Arabian plate. The study is focused on a number of selected wells from several fields in southern Iraq, despite the many of oil studies to Shuaiba Formation but it lacks to paleontological studies. Four selected wells are chosen for the current study, Zb-290, Ru-358, R-624, WQ1-353, the selected wells are located within different fields, these are Zubair, Rumaila and West Qurna Oil Fields. In this study fourteen species followed to genus Hedbergella were discovered for first time as well as three genera followed to genus Heterohelix in the Shuaiba Formation at the different oil fields, Hedbergella tuni

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Establishment of Causal Attribution as A Regulatory Strategy for Teaching and Learning
...Show More Authors

The theme of causal attribution has generated a great deal of work and focuses on the factors to which people attribute their behavior. However, its use to explain the results of the evaluation and the support for the regulation of teaching and learning acts has rarely been raised. Indeed, in the evaluation act, which is a privileged moment for reframing the learning process, teachers attribute the results obtained to the student himself, without worrying about the factors to which the student attribute itself these failures. This can distort the regulatory process and increase failure factors. The teacher's attributions of failure often relate to the results of the evaluations and are often explained by factors external to him: such as

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Machine Learning Based Crop Yield Prediction Model in Rajasthan Region of India
...Show More Authors

     The present study investigates the implementation of machine learning models on crop data to predict crop yield in Rajasthan state, India. The key objective of the study is to identify which machine learning model performs are better to provide the most accurate predictions. For this purpose, two machine learning models (decision tree and random forest regression) were implemented, and gradient boosting regression was used as an optimization algorithm. The result clarifies that using gradient boosting regression can reduce the yield prediction mean square error to 6%. Additionally, for the present data set, random forest regression performed better than other models. We reported the machine learning model's performance using Mea

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
Cheating in E-learning from the perspective of lecturers within Iraqi universities
...Show More Authors

Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Oct 13 2023
Journal Name
Engineering, Technology & Applied Science Research
The Experimental and Theoretical Effect of Fire on the Structural Behavior of Laced Reinforced Concrete Deep Beams
...Show More Authors

A Laced Reinforced Concrete (LRC) structural element comprises continuously inclined shear reinforcement in the form of lacing that connects the longitudinal reinforcements on both faces of the structural element. This study conducted a theoretical investigation of LRC deep beams to predict their behavior after exposure to fire and high temperatures. Four simply supported reinforced concrete beams of 1500 mm, 200 mm, and 240 mm length, width, and depth, respectively, were considered. The specimens were identical in terms of compressive strength (  40 MPa) and steel reinforcement details. The same laced steel reinforcement ratio of 0.0035 was used. Three specimens were burned at variable durations and steady-state temperatures (one

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 16 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
Effective reading skills and their relationship to deep understanding of chemistry among middle school students in Iraq
...Show More Authors

Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Health Science Reports
Immunohistochemical expression of angiotensin‐converting enzyme 2 in superficial and deep maxillofacial tissues: A cross‐sectional study
...Show More Authors
Abstract<sec><title>Background and Aims

The involvement of maxillofacial tissues in SARS‐CoV‐2 infections ranges from mild dysgeusia to life‐threatening tissue necrosis, as seen in SARS‐CoV‐2‐associated mucormycosis. Angiotensin‐converting enzyme 2 (ACE2) which functions as a receptor for SARS‐CoV‐2 was reported in the epithelial surfaces of the oral and nasal cavities; however, a complete understanding of the expression patterns in deep oral and maxillofacial tissues is still lacking.

Methods

The immunohistochemical expression of ACE2 was analyzed in 95 specimens from maxillofacial tissues and 10 specimens o

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Transient response and performance of prestressed concrete deep T-beams with large web openings under impact loading
...Show More Authors
Abstract<p>This study reports testing results of the transient response of T-shape concrete deep beams with large openings due to impact loading. Seven concrete deep beams with openings including two ordinary reinforced, four partially prestressed, and one solid ordinary reinforced as a reference beam were fabricated and tested. The effects of prestressing strand position and the intensity of the impact force were investigated. Two values for the opening’s depth relative to the beam cross-section dimensions were inspected under the effect of an impacting mass repeatedly dropped from different heights. The study revealed that the beam’s transient deflection was increased by about 50% with gre</p> ... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref