Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method.
We will also derive practical solutions using predictive analytics. And this would include application making predictions with real world example from University of Faculty of Chariaa of Fez. As soon as student enrolled to the university, they will certainly encounter many difficulties and problems which discourage their motivation towards their courses and which pushes them to leave their university.
The aim of our article is to manage an investigation of the issue of dropping out their studies. This investigation actively integrates the benefits ofmachine learning. Hence, we will concentrate on two fundamental strategies which are KNN, which depends on the idea of likeness among data; and the famous strategy SVM, which can break the
--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as wel
... Show MoreIdentification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed to d
... Show MoreFuzzy measures are considered important tools to solve many environmental problems. Water pollution is one of the environmental problems, which has negatively effect on the health of consumers. In this paper, a mathematical model is proposed to evaluate water quality in the distribution networks of Baghdad city. Fuzzy logic and fuzzy measures have been applied to evaluate water quality with respect to chemical and microbiological contaminants. Our results are evaluate water pollution of some chemical and microbiological contaminants, which are difficult to evaluation through traditional methods.
Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreBackground subtraction is the dominant approach in the domain of moving object detection. Lots of research has been done to design or improve background subtraction models. However, there are a few well-known and state-of-the-art models that can be applied as a benchmark. Generally, these models are applied to different dataset benchmarks. Most of the time, choosing an appropriate dataset is challenging due to the lack of dataset availability and the tedious process of creating ground-truth frames for the sake of quantitative evaluation. Therefore, in this article, we collected local video scenes of a street and river taken by a stationary camera, focusing on dynamic background challenges. We presented a new technique for creati
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreIt is commonly known that Euler-Bernoulli’s thin beam theorem is not applicable whenever a nonlinear distribution of strain/stress occurs, such as in deep beams, or the stress distribution is discontinuous. In order to design the members experiencing such distorted stress regions, the Strut-and-Tie Model (STM) could be utilized. In this paper, experimental investigation of STM technique for three identical small-scale deep beams was conducted. The beams were simply supported and loaded statically with a concentrated load at the mid span of the beams. These deep beams had two symmetrical openings near the application point of loading. Both the deep beam, where the stress distribution cannot be assumed linear, and the ex
... Show MoreA novel encapsulated deep eutectic solvent (DES) was introduced for biodiesel production via a two-step process. The DES was encapsulated in medical capsules and were used to reduce the free fatty acid (FFA) content of acidic crude palm oil (ACPO) to the minimum acceptable level (< 1%). The DES was synthesized from methyltriphenylphosphonium bromide (MTPB) and p-toluenesulfonic acid (PTSA). The effects pertaining to different operating conditions such as capsule dosage, reaction time, molar ratio, and reaction temperature were optimized. The FFA content of ACPO was reduced from existing 9.61% to less than 1% under optimum operating conditions. This indicated that encapsulated MTPB-DES performed high catalytic activity in FFA esterificatio
... Show MoreAlzheimer’s Disease (AD) is the most prevailing type of dementia. The prevalence of AD is estimated to be around 5% after 65 years old and is staggering 30% for more than 85 years old in developed countries. AD destroys brain cells causing people to lose their memory, mental functions and ability to continue daily activities. The findings of this study are likely to aid specialists in their decision-making process by using patients’ Magnetic Resonance Imaging (MRI) to distinguish patients with AD from Normal Control (NC). Performance evolution was applied to 346 Magnetic Resonance images from the Alzheimer's Neuroimaging Initiative (ADNI) collection. The Deep Belief Network (DBN) classifier was used to fulfill classification f
... Show More