Preferred Language
Articles
/
ijs-247
Intelligent Age Estimation From Facial Images Using Machine Learning Techniques
...Show More Authors

     Lately, a growing interest has been emerging in age estimation from face images because of the wide range of potential implementations in law enforcement, security control, and human computer interactions. Nevertheless, in spite of the advances in age estimation, it is still a challenging issue. This is due to the fact that face aging process is not only set by distinct elements, such as genetic factors, but by extrinsic factors, such as lifestyle, expressions, and environment as well. This paper applied machine learning technique to intelligent age estimation from facial images using J48 classifier on FG_NET dataset. The proposed work consists of three phases; the first phase is image preprocessing which include five stages: gray scale image, noise removable, face detection, image size normalization and clipping process. The second phase is a data mining process which includes three stages: feature extraction, feature selection and classification using j48 classifier. The third phase includes two stages, estimation and evaluation. FG-NET dataset is used which is divided into three classes; first class represents (3-7), (26-30) ages and this class represents the ages from 3 to 7 years and from 26 to 30 years because this class have four attributes from any one of this images, second class represents (8-25) ages and this class represents the ages from 8 to 25 years because this class have five attributes from any one of this images, last class represents (31-50) ages and have nine attributes from any one of this images. The Experimental results illustrate that the proposed system can give results with high precision and low time complexity. The practical evaluation of the proposed system gives accuracy up to 89.13 % with time taken of 0.023.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Shape Feature Extraction Techniques for Fruits: A Review
...Show More Authors

          Fruits sorting, recognizing, and classifying are essential post-harvest operations, as they contribute to the quality of food industry, thereby increasing the exported quantity of food. Today, an automated system for fruit classification and recognition is very important, especially when exporting to markets where quality of fruit must be high. In this study, the advantages and disadvantages of the various shape-based feature extraction algorithms and technologies that are used in sorting, classifying, and grading of fruits, as well as fruits quality estimation, are discussed in order to provide a good understanding of the use of shape-based feature extraction techniques.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 08 2024
Journal Name
Technology In Agronomy
Harnessing automation techniques for supporting sustainability in agriculture
...Show More Authors

Automation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,

... Show More
View Publication
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
New Irrigation Techniques for Precision Agriculture: A Review
...Show More Authors

Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us

... Show More
Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Representative hiring in the interactive theater performance techniques
...Show More Authors

That researchers in the play Science Find a theatrical form of an experimental creative, and these experiences taken from the innovation space aesthetic dialogue with the receiver, especially since with previous theatrical experience and is an extension of her, because the interactive theater theatrical terms that assume a pattern do from the depth of the relationship between supply playwright and the audience, which alters the receiving skills actually change, and to monitor these differing divided into three classes that include research, methodological framework (Chapter I) and includes, research problem, the importance of research and the need to him, the goal of the research, the limits Find it border, and the theoretical framework

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 13 2019
Journal Name
Journal Of The College Of Languages (jcl)
Certains aspects techniques Chez Henri Barbusse dans L'ENFER
...Show More Authors

L’Enfer est un roman de chambre par excellence. Tous les événements s'y sont presque déroulés. Le sujet de ce roman se résume: un jeune homme quitte la campagne pour vivre à Paris .Il loue une chambre dans un hôtel. Il tombe, par un pur hasard, sur une fente dans le mur de sa par laquelle chambre il peut voir tout ce qui se passe dans la chambre voisine .L'histoire racontée par ce narrateur, est la vie intime des couples venant dans cette chambre. Il médite sur sa propre condition à la lumière de ce qui se déroule dans la chambre voisine .C'est pour cette raison,que le roman se caractérise par une stabilité.Quoi qu’elle soit manifeste, le héros démontre une mobilité à son niveau psychique. Car il y a une évolution

... Show More
View Publication Preview PDF