Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and to evaluate test samples and training samples for person identification using distance criteria or neural networks.
In this research, we highlight the most important research related to the mixed ligand complexes of the drug trimethoprim (TMP), and for the past 7 years where this drug has been used as a chelating ligand and gives stability to the complexes with ions of metal elements where these complexes, prepared and diagnosed, and for some research the bacterial activity was studied against different types of bacteria.
The current study aimed to review previous scholarly efforts to understand the concept of sustainable development, its practices, and its significance for public institutions. The study focuses on the dimensions of sustainable development—environmental, social, and economic—within public institutions. Sustainable development allows these institutions to balance environmental protection, economic growth, and social justice, ensuring the prosperity of both current and future generations. Furthermore, sustainable development is crucial for maintaining organizational performance. The review bridges knowledge gaps related to sustainable development and utilizes an analytical approach, surveying previous studies on the topic. The sele
... Show MoreNanotechnology extends the limits of molecular diagnostics to the nanoscale. This study describes some of the details of how the body interacts with nanoparticles. Biological tests measuring the presence or activity of selected substances become quicker, more sensitive, and more flexible when certain nanoscale particles are put to work as tags. Particular emphasis is placed on the effects of surface changes on body-borne particles, their transport within the body, and the dose-response effect. Other considerations include the definition of "persistent" in the context of therapy, FDA scientific committees, and the need for nanoparticle tracking. In short, there have been dramatic changes in molecular and genetic research findings, as well as
... Show MoreObjectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how
... Show MoreSignificant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More