Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes into account the majority of the challenges faced by existing methods of age estimate. Making use of the data set that serves as the foundation for the face estimation system in this region (IMDB-WIKI). By performing preparatory processing activities to setup and train the data in order to collect cases, and by using the CNN deep learning method, which yielded results with an accuracy of 0.960 percent, we were able to reach our objective.
Shuaiba Formation is an important formation in Iraq, because of their deposition in the important period during the geological history of Arabian plate. The study is focused on a number of selected wells from several fields in southern Iraq, despite the many of oil studies to Shuaiba Formation but it lacks to paleontological studies. Four selected wells are chosen for the current study, Zb-290, Ru-358, R-624, WQ1-353, the selected wells are located within different fields, these are Zubair, Rumaila and West Qurna Oil Fields. In this study fourteen species followed to genus Hedbergella were discovered for first time as well as three genera followed to genus Heterohelix in the Shuaiba Formation at the different oil fields, Hedbergella tuni
... Show MoreThe theme of causal attribution has generated a great deal of work and focuses on the factors to which people attribute their behavior. However, its use to explain the results of the evaluation and the support for the regulation of teaching and learning acts has rarely been raised. Indeed, in the evaluation act, which is a privileged moment for reframing the learning process, teachers attribute the results obtained to the student himself, without worrying about the factors to which the student attribute itself these failures. This can distort the regulatory process and increase failure factors. The teacher's attributions of failure often relate to the results of the evaluations and are often explained by factors external to him: such as
... Show MoreThe present study investigates the implementation of machine learning models on crop data to predict crop yield in Rajasthan state, India. The key objective of the study is to identify which machine learning model performs are better to provide the most accurate predictions. For this purpose, two machine learning models (decision tree and random forest regression) were implemented, and gradient boosting regression was used as an optimization algorithm. The result clarifies that using gradient boosting regression can reduce the yield prediction mean square error to 6%. Additionally, for the present data set, random forest regression performed better than other models. We reported the machine learning model's performance using Mea
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreA Laced Reinforced Concrete (LRC) structural element comprises continuously inclined shear reinforcement in the form of lacing that connects the longitudinal reinforcements on both faces of the structural element. This study conducted a theoretical investigation of LRC deep beams to predict their behavior after exposure to fire and high temperatures. Four simply supported reinforced concrete beams of 1500 mm, 200 mm, and 240 mm length, width, and depth, respectively, were considered. The specimens were identical in terms of compressive strength ( 40 MPa) and steel reinforcement details. The same laced steel reinforcement ratio of 0.0035 was used. Three specimens were burned at variable durations and steady-state temperatures (one
... Show MoreThe involvement of maxillofacial tissues in SARS‐CoV‐2 infections ranges from mild dysgeusia to life‐threatening tissue necrosis, as seen in SARS‐CoV‐2‐associated mucormycosis. Angiotensin‐converting enzyme 2 (ACE2) which functions as a receptor for SARS‐CoV‐2 was reported in the epithelial surfaces of the oral and nasal cavities; however, a complete understanding of the expression patterns in deep oral and maxillofacial tissues is still lacking.
The immunohistochemical expression of ACE2 was analyzed in 95 specimens from maxillofacial tissues and 10 specimens o
This study reports testing results of the transient response of T-shape concrete deep beams with large openings due to impact loading. Seven concrete deep beams with openings including two ordinary reinforced, four partially prestressed, and one solid ordinary reinforced as a reference beam were fabricated and tested. The effects of prestressing strand position and the intensity of the impact force were investigated. Two values for the opening’s depth relative to the beam cross-section dimensions were inspected under the effect of an impacting mass repeatedly dropped from different heights. The study revealed that the beam’s transient deflection was increased by about 50% with gre
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreWireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show More