Recently there has been an urgent need to identify the ages from their personal pictures and to be used in the field of security of personal and biometric, interaction between human and computer, security of information, law enforcement. However, in spite of advances in age estimation, it stills a difficult problem. This is because the face old age process is determined not only by radical factors, e.g. genetic factors, but also by external factors, e.g. lifestyle, expression, and environment. This paper utilized machine learning technique to intelligent age estimation from facial images using support vector machine (SVM) on FG_NET dataset. The proposed work consists of three phases: the first phase is image preprocessing include four stages: grayscale image stage, histogram equalization stage, face detection stage has been carried out using viola jones algorithm, it comprises for four steps namely: Haar like Feature, integral image, Adaboost training, and cascading classifier, the last stage of image preprocessing phase is cropping and resize stage. The second phase is data mining include two stages: feature extraction stage using linear discriminate analysis and machine learning stage using support vector machine. The last phase is age estimation and evaluation. The FG-net dataset is used which divided into seven classes in order to has been became increased accuracy and reduce the execution time, the first class represents 3-7 years, the second class represents 8-13 years, the third class represents 14-19 years, the forth class represents 20-25 years, the fifth class represents 26-30 years, the sixth class represents 31-40 years and the seven class represents 41-50 years. Then, the seven classes are combined into three classes depending on the number of features. The Experimental results display that the proposed system can grant high accuracy. The practical evaluation of the proposed system gives accuracy is 84%.
The study involved preparing a new compound by combining Schiff bases generated from compounds for antipyrine, including lanthanide ions (lanthanum, neodymium, erbium, gadolinium, and dysprosium). The preparation of the ligand from condensation reactions (4-antipyrinecarboxaldehyde with ethylene di-amine) at room temperature, and was characterization using spectroscopic and analytical studies ( FT-IR, UV-visible spectra, 1H-NMR, mass spectrometry, (C.H.N.O), thermogravimetric analysis (TGA), in addition to the magnetic susceptibility and conductivity measurement of the synthesis complexes, among the results we obtained from the tests, we showed that the ligand behaves with the (triple Valence) lanthanide ions, the multidentate
... Show MoreIntegrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In
... Show MoreProsthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the
... Show MoreIn this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreThe purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:
What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)?
In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden
... Show MoreIn this paper, the time-fractional Fisher’s equation (TFFE) is considered to exam the analytical solution using the Laplace q-Homotopy analysis method (Lq-HAM)â€. The Lq-HAM is a combined form of q-homotopy analysis method (q-HAM) and Laplace transform. The aim of utilizing the Laplace transform is to outdo the shortage that is mainly caused by unfulfilled conditions in the other analytical methods. The results show that the analytical solution converges very rapidly to the exact solution.
Total quality management considers one of the modern scientific entrances which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have in a manner in which they can be addressed and find ways to avoid them in the future when repeated. &n
... Show More