Preferred Language
Articles
/
exeVPo8BVTCNdQwCNGWb
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes into account the majority of the challenges faced by existing methods of age estimate. Making use of the data set that serves as the foundation for the face estimation system in this region (IMDB-WIKI). By performing preparatory processing activities to setup and train the data in order to collect cases, and by using the CNN deep learning method, which yielded results with an accuracy of 0.960 percent, we were able to reach our objective.

Scopus
Publication Date
Fri Sep 27 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The effects of thumb sucking habit on the development of malocclusions in preschool age children in Hilla city
...Show More Authors

Background: habit is any purposeless action repeated unconsciously. It is a sign of lack of harmony between the subject and the surrounding environment. Deleterious oral habits such as finger sucking could be one of the etiological factors for altered oro-facial growth development. This study conducted to explore the association between finger sucking habit and malocclusion in deciduous dentition. Materials and method: Totally 40 chronic thumb sucker and 40 controls matching in age and gender were enrolled in the study. A study conducted by verifying different occlusal trait through the intra-oral examination. Thumb sucking habit diagnosed using data gathered from parents. Results: The statistical analysis showed a highly significant dif

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Comparison Different Estimation Method for Reliability Function of Rayleigh Distribution Based On Fuzzy Lifetime Data
...Show More Authors

    In this study, we present different methods of estimating fuzzy reliability of a two-parameter Rayleigh distribution via the maximum likelihood estimator, median first-order statistics estimator, quartile estimator, L-moment estimator, and mixed Thompson-type estimator. The mean-square error MSE as a measurement for comparing the considered methods using simulation through different values for the parameters and unalike sample sizes is used. The results of simulation show that the fuzziness values are better than the real values for all sample sizes, as well as  the fuzzy reliability at the estimation  of the Maximum likelihood Method, and Mixed Thompson Method perform better than the other methods in the sense of MSE, so that

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Scientific Development For Studies And Research
The Role of E-Learning in teaching the Arabic language to non- native speakers
...Show More Authors

After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
The Association of Age and Gender with the Histopathological Features among Thyroid Cancer Patients in Erbil City, Iraq: Clinical Analysis of 153 Cases
...Show More Authors

     Background: Thyroid cancer (TC) is an increasingly prevalent malignancy throughout the world. It has long been recognized that the incidence of TC is higher in women which increases with age. However, the association of gender disparity and age with TC aggressiveness and outcomes are still controversial. The aim of this study was focused on the association of age and gender with histopathological characteristics in TC. Methods: 153 patients who met the criteria, were selected.  The included cases were divided into four age groups (≤24 years, 25-44 years, 45-64 years, and ≥65 years). Demographic, age and pathological parameters were compared among them. The association of gender and age with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Video Image Compression Using Absolute Moment Block Truncation Method with Orthogonal Search Motion Estimation Technique
...Show More Authors

Image compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of oth

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 25 2018
Journal Name
Summaries Of Working Papers, Research And Experiments
E-learning at the College of Mass Communication, subject: public relations campaigns as a model
...Show More Authors

Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of spastic cerebral palsy upon the quality of life of children under the age of 12 years in Erbil City: parents’ reports
...Show More Authors

Objectives: This study aims to assess the quality of life of cerebral palsy children less than 12 years old reported by
parents in Erbil city/Iraq.
Methodology: A descriptive study was conducted during 2014, to describe the quality of life of cerebral palsy
children. One hundred mothers have cerebral palsy children were participated in this study. The study took place at
Helena Center for handicapped children in Erbil City. Questionnaire was used to collect data, which consists of two
main parts. The first part is divided into two sections; section one was described the mothers’ demographic
characteristics, while the second section was for identifying the demographical characteristics of cerebral palsy
children. Th

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Simulation Design and Performance of a Residential Complex Using Liquefied Petroleum Gas Network
...Show More Authors

The population has been trying to use clean energy instead of combustion. The choice was to use liquefied petroleum gas (LPG) for domestic use, especially for cooking due to its advantages as a light gas, a lower cost, and clean energy. Residential complexes are supplied with liquefied petroleum gas for each housing unit, transported by pipes from LPG tanks to the equipment. This research aims to simulate the design and performance design of the LPG system in the building that is applied to a residential complex in Baghdad taken as a study case with eight buildings. The building has 11 floors, and each floor has four apartments. The design in this study has been done in two parts, part one is the design of an LPG system for one building, an

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref