Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show Morethis research aims to identify the impact of teaching with ana logies in collection of chemistry students grade average.And direction in order to verify to the zero hypothesis has been formulated and validated,The researcher conducted experiment lasted a full semester as experimental design was chosen (exactly)two equal one pilot and another officer.The research community has been selected one of intentional Middle School of the Education Directorate in B aghdad Karkh second either search sample consisted of (68) students from second grade average (34 ) Students for each group randomly selected research groups was equal to the following variables (lifetime months,parent of first grade chemistry degrees average test informat
... Show MoreObjective(s): The present study aims at identifying the Iraqi Colleges of Nursing Deans' leadership
behaviors effectiveness and faculty members' motivation towards work in these colleges.
Methodology: Descriptive design has been used for the sample survey manner, which is the
appropriate approach to the study of social phenomena in the field where provides data on the reality of
these phenomena and relations between the causes and consequences and an analysis of it and perhaps
the factors affecting it and how it appears. The study relies on a questionnaire to collect data from the
participants which is composed of (86) items distributed on three axes: First, the demographic
characteristics which are composed of (8) i
Optical properties and surface morphology of pure and doped Polystyrene films with different divalent metals of Zn, Cu and Sn and one concentration percentage have been studied. Measurements of UV-Vis spectrophotometer and AFM spectroscopy were determined. The absorbance, transmittance and reflectance spectrums were used to study different optical parameters such as absorption coefficient, refractive index, extinction coefficient and energy gap in the wavelengths rang 200-800nm. These parameters have increased in the presence of the metals. The change in the calculated values of energy gaps with doping metals content has been investigated in terms of PS matrix structural modification. The value of opt
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe phenomenon of terrorism is one of the most serious challenges facing the world at present. So this concept has occupied a great deal of interest of researchers and scholars in the relevant disciplines. There is no doubt that the study of the concept of terrorism requires a study of its various aspects. However, this study will be limited to knowing the role of television channels in providing the public with information about terrorist events, the extent to which young people rely on these channels to shape their attitudes towards terrorism issues. This study also seeks the relationship between satellite television channels and terrorism based on the relevant media li
... Show MoreThin films samples of Bismuth sulfide Bi2S3 had deposited on
glass substrate using thermal evaporation method by chemical
method under vacuum of 10-5 Toor. XRD and AFM were used to
check the structure and morphology of the Bi2S3 thin films. The
results showed that the films with law thickness <700 nm were free
from any diffraction peaks refer to amorphous structure while films
with thickness≥700 nm was polycrystalline. The roughness decreases
while average grain size increases with the increase of thickness. The
A.C conductivity as function of frequency had studied in the
frequency range (50 to 5x106 Hz). The dielectric constant,
polarizability showed significant dependence upon the variation of
thic
Carbonized nonwoven nanofibers composite were fabricated using the electrospinning method of a polymeric solution composite followed by heat treatment including stabilization and calcination steps. The spun polymeric solution was a binary polymer mixture/organic solvent. In this study, two types of polymers (Polymethylmethacrylate (PMMA) and Polyethylene glycol (PEG)) were used separately as a copolymer with the base polymer (Polyacrylonitrile (PAN)) to prepare a binary polymer mixture in a mixing ratio of 50:50. The prepared precursor solutions were used to prepare the precursor nanofibers composite (PAN: PMMA) and (PAN: PEG). The fabricated precursors nonwoven fibers composite were stabilized and carbonized to produce carbon nonw
... Show More