Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in an image, possesses the unique characteristic that no two individuals share the same ear patterns. Consequently, our research proposes a system for individual identification based on ear traits, comprising three main stages: (1) pre-processing to extract the ear pattern (region of interest) from input images, (2) feature extraction, and (3) classification. Convolutional Neural Network (CNN) is employed for the feature extraction and classification tasks. The system remains invariant to scaling, brightness, and rotation. Experimental results demonstrate that the proposed system achieved an accuracy of 99.86% for all datasets.
Neural stem cells (NSCs) are progenitor cells which have the ability to self‑renewal and potential for differentiating into neurons, oligodendrocytes, and astrocytes. The in vitro isolation, culturing, identification, cryopreservation were investigated to produce neural stem cells in culture as successful sources for further studies before using it for clinical trials. In this study, mouse bone marrow was the source of neural stem cells. The results of morphological study and immunocytochemistry of isolated cells showed that NSCs can be produced successfully and maintaining their self‑renewal and successfully forming neurosphere for multiple passages. The spheres preserved their morphology in culture and cryopreserved t
... Show MoreIn this paper a dynamic behavior and control of a jacketed continuous stirred tank reactor (CSTR) is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.
The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.
The results s
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show Moreproduction of the spot in the news channels - a study of patterns of spot media used in the production of spring breaks Arab Al-Arabiya
The spacers news in Arabic, one of the messages that seek channel output are fit and policy on the one hand and meet the needs of viewers for information intensive and image influential to find out the latest developments on the Arab arena, especially the Syrian revolution on the other and thus The viewer for the type of coverage the stomach through a newsletter about the event on the one hand to keep following up on her and eager to watch the other hand
And sou
... Show MoreIn this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.
Many risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected