Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many applications, including safety and security systems, border control, human engagement in sophisticated ambient analytics, and biometric identification. Determining a person's age and gender is a complex study method. With the advent of deep learning, the study of face systems has been completely transformed, and estimation accuracy is a crucial parameter for evaluating algorithms and their efficacy in predicting absolute ages. The UTKFace dataset, which serves as the backbone of the face estimating system, was used to assess the method. The eyes, cheeks, nose, lips, and forehead provide the foundation of this function. AlexNet achieves a 98% accuracy rate across its lifespan of system results.
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
In the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid
... Show Moreالوصف Mixed ligand complexes of Cu (II), Co (II) and Zn (II) with 2-((4-(1-(4-chlorophenylimino) ethyl) phenylimino) methyl) phenol (L) and histidine (His) have been prepared and diagnosed by ¹H and13 C NMR, FT-IR and electronic spectral data, thermal gravimetric, molar conductance and metal analysis measurements. The ligand (L) shows a bidentate nature and the coordination occurs through N and O atoms of imine group and phenol group respectively whereas (His) behave as tridentate ligand, coordinating through the-NH2 group and carboxylate oxygen group and N atoms of imidazole ring. The analytical studies for three complexes have shown octahedral structure. The anticancer activity was screened against human cancer cell such Follicular
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show More