Preferred Language
Articles
/
pRZOXYsBVTCNdQwCCMqr
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many applications, including safety and security systems, border control, human engagement in sophisticated ambient analytics, and biometric identification. Determining a person's age and gender is a complex study method. With the advent of deep learning, the study of face systems has been completely transformed, and estimation accuracy is a crucial parameter for evaluating algorithms and their efficacy in predicting absolute ages. The UTKFace dataset, which serves as the backbone of the face estimating system, was used to assess the method. The eyes, cheeks, nose, lips, and forehead provide the foundation of this function. AlexNet achieves a 98% accuracy rate across its lifespan of system results.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Ibuprofen in Pharmaceutical Formulations Using Differential Pulse Polarography
...Show More Authors

     A reliable differential pulse polarographic (DPP) method has been developed and applied for the determination of ibuprofen IBU in dosage form with dropping mercury electrode (DME) versus Ag/AgCl. The best peak was found at cathodic peak of -1.18 V in phosphate buffer at pH=4 and 0.025M of KNO3 as supporting electrolyte. In order to obtaine the highest sensitivity, instrumental and experimental parameters were examined including the type and concentration of supporting electrolyte, pH of buffer solution, pulse amplitude and voltage step time. Diffusion current showed a direct linear relationship to ibuprofen concentration in the range of (5 – 30) μg. mL-1 (2.43× 10-5

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Wasit Journal Of Engineering Sciences
Blue Laser Underwater Optical Visible Light Communication Using Recursive OFDM
...Show More Authors

Water covers more than 75% of the earth's surface in the form of the ocean. The ocean investigation is far-fetched because the underwater environment has distinct phenomenal activities. The expansion of human activities inside underwater environments includes environmental monitoring, offshore field exploration, tactical surveillance, scientific data collection, and port security. This led to increased demand for underwater application communication systems. Therefore, the researcher develops many methods for underwater VLC Visible Light Communications. The new technology of blue laser is a type of VLC that has benefits in the application of underwater communications. This research article investigated the benefits of underwater blu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
World Journal Ofexperimentalbiosciences
transformation of Saccharomyces cerevisiae by PET plasmid using lithium acetate
...Show More Authors

Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
A Study of a-Si:H Absorption Edge Using Dunstan’s Model
...Show More Authors

The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Engineering
DEWAXING OF DISTILLATE OIL FRACTION (400- 500 ºC) USING UREA
...Show More Authors

De-waxing of lubricating oil distillate (400-500 ºC) by using urea was investigated in the present study. Lubricating oil distillate produced by vacuum distillation and refined by furfural extraction was taken from Al-Daura refinery. This oil distillate has a pour point of 34 ºC. Two solvents were used to dilute the oil distillate, these are methyl isobutyl ketone and methylene chloride. The operating conditions of the urea adduct formation with n-paraffins in the presence of methyl isobutyl ketone were studied in details, these are solvent to oil volume ratio within the range of 0 to 2, mixer speed 0 to 2000 rpm, urea to wax weight ratio 0 to 6.3, time of adduction 0 to 71 min and temperature 30-70 ºC). Pour point of de-waxed oil and yi

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
using collocation method for solving differential equations with time lag
...Show More Authors

in this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach

View Publication Preview PDF
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref