Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a recognition rate of 97.75% in the presence of facial expression, lighting and pose variations. Results are compared with its wavelet-based counterpart where it obtained a recognition rate of 10.4%. The proposed multiwavenet demonstrated very good recognition rate in the presence of variations in facial expression, lighting and pose and outperformed its wavelet-based counterpart.
Background: Consideration of mandibular third molar is important from orthodontic perspective due to several factors such as, lower anterior arch crowding, relapse in lower anterior region, interference with uprighting of mandibular first and second molars during anchorage preparation and molar distalization. The aims of this study were to assess of gender differences in the mandibular third molar position and compare and evaluate whether there is any differences in the results provided by CT scan and lateral reconstructed radiograph. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years. CT images for patients who were attending at Al Suwayra General Hospital/the C
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreHelps to use the mechanics of organizational agility in improving product quality by reducing waste or reduce it by removing activities that do not add value, which is the main reason for inefficiency and low productivity and increase costs, so the difficulty of changing administrative decisions to cope with internal and external changes to keep up with market trends renewable are the basic issue that research seeks to be addressed through the adoption of mechanisms of organizational agility, which will be reflected in bottom line in a positive way in improving the quality of products, and thus lies Applied important to look at the light of the results achieved and in which they can know the nature of the relationship between the
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
In this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was
... Show MoreThis study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreEstimation of the tail index parameter of a one - parameter Pareto model has wide important by the researchers because it has awide application in the econometrics science and reliability theorem.
Here we introduce anew estimator of "generalized median" type and compare it with the methods of Moments and Maximum likelihood by using the criteria, mean square error.
The estimator of generalized median type performing best over all.
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe aim of this study is to synthesize an easy, non-toxic and eco-friendly method. Silver nanoparticles which were synthesized by leaf extract of mint were characterized by UV-Visible Spectroscopy which appears UVVisible spectrum of demonstrated a peak 448 nm corresponding to surface Plasmon resonance of silver nanoparticles, Fourier Transform Infrared Spectroscopy (FTIR); functional groups involved in the silver nanoparticles synthesis were identified, the presence of silver nanoparticles was confirmed by X-ray diffraction (XRD) and Atomic Force Microscope (AFM) analysis clearly illustrated that the shape of silver nanoparticles was spherical and the size of the silver nanoparticles has been measured as 55- 85 nm. Evaluation of its antimic
... Show More