Face Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these are the Extreme Value Distribution Function and the Exponential Distribution Function methods, in addition to a new proposed model, over the HSV (Hue, Saturation, and Value) color space. The suggested technique aims to enhance skin pixel detection and improve the detection accuracy of a colored region in the human skin in a specific photo. The new model has proved to be 96.05% more accurate than the Extreme value distribution function and Exponential distribution function according to the selected region of the face during experiments. The images used in this paper were 380 color images from CalTech (California Technology Institute) dataset.
In general, researchers and statisticians in particular have been usually used non-parametric regression models when the parametric methods failed to fulfillment their aim to analyze the models precisely. In this case the parametic methods are useless so they turn to non-parametric methods for its easiness in programming. Non-parametric methods can also used to assume the parametric regression model for subsequent use. Moreover, as an advantage of using non-parametric methods is to solve the problem of Multi-Colinearity between explanatory variables combined with nonlinear data. This problem can be solved by using kernel ridge regression which depend o
... Show MoreGame theory problems (GTP) frequently occur in Economy, Business Studies, Sociology, Political Science, Military Activities, and so on are some of the subjects covered. To tackle the uncertainty in Games, the analysis of games in which the payoffs are represented by fuzzy numbers (FN) will benefit from fuzzy set theory (FST).
The purpose of this paper is to develop an efficient technique for solving constraint matrix games (MG) with payoff trapezoidal fuzzy numbers (TFN). The description of the new ranking method is introduced for a constrained matrix with TFN and values. Stock market forecasting has been one of the most important research areas for decades. Stock market values are volatile, non-linear, complicated and ch
... Show MoreRenal function tests are commonly used in clinical practice to look for renal disease, the most common includes the serum urea, uric acid and creatinine. Heart failure patients have a higher incidence of renal function test abnormalities than individuals who do not have heart failure disease. Fifty subjects of adults (male) were divided in to two groups, 25 subjects (healthy) as control (group1) and 25 subjects with heart failure (group 2). Our results indicate that serum uric acid, urea, and creatinine values were significantly elevated (P≤0.05) in patients group (2) compared with healthy group (1). The results also showed, the effect of age categories on uric acid blood urea nitrogen and creatinine values (P≤0.05) and there were no si
... Show MoreThe aim of this work is to detect the best operating conditions that effect on the removal of Cu2+, Zn2+, and Ni2+ ions from aqueous solution using date pits in the batch adsorption experiments. The results have shown that the Al-zahdi Iraqi date pits demonstrated more efficient at certain values of operating conditions of adsorbent doses of 0.12 g/ml of aqueous solution, adsorption time 72 h, pH solution 5.5 ±0.2, shaking speed 300 rpm, and smallest adsorbent particle size needed for removal of metals. At the same time the particle size of date pits has a little effect on the adsorption at low initial concentration of heavy metals. The adsorption of metals increases with increas
... Show MoreBackground: Herbal medicine can be called one of the branches of medicine in various forms. Turmericcurcumin has proved its efficiencies a coloring, flavoring agent and has been traditionally used in medicine, exhibiting remarkable anti-inflammatory and antioxidant properties. The varied biological properties of curcumin and lack of toxicity even when administered at higher doses makes it attractive to explore its use in various disorders like diseases of skin. It is good potential agent for wound healing. Materials and methods: Sixty four new Zealand rabbits were used in this study ,they were divided into four groups,each group was subdivided as follows:Experimental groups(8 rabbits) right facial side of animals for essential oil applicati
... Show MoreBackground: Wounds are any disruption to the normal anatomic structure of tissue which leads to the loss of epithelial continuity with or without a loss of underlying connective tissue, as well as the anatomic and functional integrity of the living tissue . Wound healing is a complex process with overlapping phases haemostasis, inflammation, proliferation and maturation/matrix Remodeling. Each phase of wound healing requires different management strategies, and inappropriate treatment can delay wound healing. The aim of wound treatment is a rapid wound closure and re-establish tissue function,chia seeds oil are widely used herbal medicines because of their anti-inflammatory and antioxidant capacity as they considerd agood source of polyunsa
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
After Zadeh introduced the concept of z-number scientists in various fields have shown keen interest in applying this concept in various applications. In applications of z-numbers, to compare two z-numbers, a ranking procedure is essential. While a few ranking functions have been already proposed in the literature there is a need to evolve some more good ranking functions. In this paper, a novel ranking function for z-numbers is proposed- "the Momentum Ranking Function"(MRF). Also, game theoretic problems where the payoff matrix elements are z-numbers are considered and the application of the momentum ranking function in such problems is demonstrated.
The nuclear charge density distributions, form factors and
corresponding proton, charge, neutron, and matter root mean square
radii for stable 4He, 12C, and 16O nuclei have been calculated using
single-particle radial wave functions of Woods-Saxon potential and
harmonic-oscillator potential for comparison. The calculations for the
ground charge density distributions using the Woods-Saxon potential
show good agreement with experimental data for 4He nucleus while
the results for 12C and 16O nuclei are better in harmonic-oscillator
potential. The calculated elastic charge form factors in Woods-Saxon
potential are better than the results of harmonic-oscillator potential.
Finally, the calculated root mean square
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.