Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreThis research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreAbstract
This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreConsidering the expanding frequency of breast cancer and high incidence of vitamin D3 [25(OH)D3] insufficiently, this investigate pointed to explain a relation between serum [25(OH)D3] (the sunshine vitamin) level and breast cancer hazard. The current study aimed to see how serum levels of each [25(OH)D3], HbA1c%, total cholesterol (TC), high density lipoprotein cholesterol (HDL-C), low density lipoprotein cholesterol (LDL-C), and triglyceride (TG) were affected a woman’s risk of getting breast cancer. In 40 healthy volunteers and 69 untreated breast cancer patients with clinical and histological evidence which include outpatients and hospitalized admissions patients at the Oncology Center, Medical City / Baghdad - Iraq. Venous blood samp
... Show MoreObjective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
The presented research investigated the pollen morphology of endemic Iraqi Hypericum species. The study revealed phenotypic features of pollen grains in the polar and equatorial views and their quantitative and qualitative characteristics. The results showed that the pollen grains of the genus Hypericum were radially symmetrical and isopolar, and their apertures were simple and tricolporate, except the species H. davisii, distinguished as tetracolprate. Dividing the studied species based on pollen grain sizes comprised two groups. Small pollen grains with an average length of the equatorial view ranged between 10–16 μm in H. lysimachioides and H. vermiculare. Medium-sized pollen grains with an average extent between 17–26 μm e
... Show MoreThis article aims to identify the views of media elites on citizen journalism, a new media genre that strays away from the foundations and ethics of professional journalism, thus calling for in-depth exploration and scrutiny into the genre and its commitment to the professional standards of journalism.
For this purpose, the researcher opted for the survey method by distributing a questionnaire to a purposive sample consisting of 407 media elites. The research is also based on Habermas' public sphere theory.