Face Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these are the Extreme Value Distribution Function and the Exponential Distribution Function methods, in addition to a new proposed model, over the HSV (Hue, Saturation, and Value) color space. The suggested technique aims to enhance skin pixel detection and improve the detection accuracy of a colored region in the human skin in a specific photo. The new model has proved to be 96.05% more accurate than the Extreme value distribution function and Exponential distribution function according to the selected region of the face during experiments. The images used in this paper were 380 color images from CalTech (California Technology Institute) dataset.
In this paper, we show many conclusions on the Quasi-Hadamard products of new Subclass of analytic functions of β-Uniformly univalent function defined by Salagean q-differential operator.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreDigital image started to including in various fields like, physics science, computer science, engineering science, chemistry science, biology science and medication science, to get from it some important information. But any images acquired by optical or electronic means is likely to be degraded by the sensing environment. In this paper, we will study and derive Iterative Tikhonov-Miller filter and Wiener filter by using criterion function. Then use the filters to restore the degraded image and show the Iterative Tikhonov-Miller filter has better performance when increasing the number of iteration To a certain limit then, the performs will be decrease. The performance of Iterative Tikhonov-Miller filter has better performance for less de
... Show MoreThis study was done to compare among 120 new and used cosmetic brands to determine the heavy metals concentrations (Cadmium, Chromium) in (face foundation, powder and blushers). Sixty new cosmetic products were bought from local markets in Baghdad city (twenty different brands foe each cosmetic products), while sixty used cosmetic products were collected from Iraqi women and they had been stored for a long time. This study proved that not all analyzed cosmetic products containing heavy metals concentrations and all concentrations are under Iraqi acceptable limits except one new blusher product which contained chromium with (28 ppm), but all used cosmetic products have shown better results in concentrations of heavy metals than new produc
... Show More
Breast cancer is one of the most common cancers in females. In Iraq there are noticeable elevation in incidence rates and prevalence of advanced stages of breast cancer. Ferritin is intracellular iron storage protein abundant in circulation and its main application in differential diagnosis of anemia.
The level of serum ferritin was found raised in various cancers including breast cancer. The aim of this study was to assess whether the serum ferritin concentration would be altered in Iraqi women with breast cancer and it could be related to progression of disease.
Sixty eight females participated in this study. The mean age of these females was 53.25± 9.52 .The level of serum ferritin was measured in 24
... Show MoreOne hundred specimens (urine and sputum) were collected in sterilized containers from patients attending two hospitals in Baghdad province including: Educational Al-Karama Hospital and Educational Al-Yarmouk Hospital, in which, thirty-eight K. pneumoniae isolate were obtained out of one hundred specimens, all of which are of urine origin. The results obtained in this study showed that Klebsiella pneumoniae isolates were highly resistant to Augmentine (94.7%), also Klebsiella isolates were resistant to Ceftriaxone (86.8%), Cefotaxime (81.5%), and Ceftazidime (65.7%). Very low level of resistance was found toward Imipenem and Meropenem (18.4% and 5.2%) respectively. Only four isolates (10.52 %) were positive for wzy gene; K19, K20, K21, an
... Show MoreIn accordance with epidemic COVID-19, the elevated infection rates, disinfectant overuse and antibiotic misuse what led to immune suppression in most of the population in addition to genotypic and phenotypic alterations in the microorganisms, so a great need to reevaluate the genetic determinants that responsible for bacterial community (biofilm) has been raised. A total of 250 clinical specimens were obtained from patients in Baghdad hospitals and streaked on Mannitol salt agar medium. The results revealed that 156 isolates appeared as round yellow colonies, indicating that they were mostly identified as Staphylococcus aureus from 250 specimens. The antibiotic resistance pattern of the isolates for methicillin 37.17% (n=58), Amoxic
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreImage pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MoreComputer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of
... Show More