Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreNumerical simulations have been carried out on the solar chimney power plant systems. This paper gives the flow field analysis for a solar chimney power generation project located in Baghdad. The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady state, turbulent is approximated by a standard k - model with Boussiuesq approximation to study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq. The different geometric parameters of project are assumed such as collector diameter and chimney height at different working conditions of solar radiation intensity (300,450,600,750
... Show MoreToday, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreBegan research of the foundations of Orientalist discourse based on force and metadata and authority, and the possibility of turning the West's view of the East as if made radical changes in the structure of the West or in a relationship of power and authority between it and the east. We have adopted in our paper on the research categories of Edward Said and visions in the field of Orientalism in general, and especially his book entitled the name of this area, not forgetting, or leave the expansion to other sources, a researcher in this field, to enrich the research.
We went to Orientalism as a concept and based cognitive, and the work of the Orientalist, and the meanings of Orientalism, which suggests Balastala which was c
... Show MoreThis paper presents an improved technique on Ant Colony Optimization (ACO) algorithm. The procedure is applied on Single Machine with Infinite Bus (SMIB) system with power system stabilizer (PSS) at three different loading regimes. The simulations are made by using MATLAB software. The results show that by using Improved Ant Colony Optimization (IACO) the system will give better performance with less number of iterations as it compared with a previous modification on ACO. In addition, the probability of selecting the arc depends on the best ant performance and the evaporation rate.
Although the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic
... Show More