Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
Objective: is to determine the level of awareness concerning the reproductive health among adolescent girls in
Baghdad City.
Methodology: A cross sectional study was performed in order to assess the level of awareness regarding reproductive
health among 180 adolescent school girls in the age 12-18 years from five secondary schools in Al-Seder Sector in
Baghdad city, the data was collected by direct interview using constructed questionnaire to obtain socio-demographic
characteristics and level of awareness related to reproductive health. The study started from September 2012 to
January 2013.
Results: the results show that the highest percentage of girls (47.7%) was in age (17-18) year's age, (54.5%) at 4th class
se
This study sheds light on female entrepreneurship in Palestine, and explores the reasons behind its relative weakness as compared with men, and with female entrepreneurship in other countries. This study aims at proposing effective policies and doable measures to enhance female entrepreneurship. Achieving this objective will carry significant impact on employment and economic growth at large, and increase women’s economic participation, scaling up their independence, and demonstrating their skills and abilities, and putting women on an equal footing with men. Furthermore, entrepreneurial activity has increasingly become one of the key drivers of economic development. An increased rate of entrepreneurial activities among women,
... Show MoreSummery of the Study: The Israeli interest in Iraq was not the result of the 2003 US war, which ended with its occupation, but Iraq was still at the top of Israeli concerns, as it was due to its interest and desire to occupy the Zionist movement for a number of reasons, most importantly its religious position in the Jews and control It is a sacred religious duty, so Israel has employed all its organs, institutions, relations and espionage networks in order to penetrate it and perpetuate its existence, and succeeded in achieving its foreign policy objectives at a time when the area was open to it without opposition or competition thanks to its strategic alliance with the states Of the United States of America, which has been able to penet
... Show MoreThis research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in
... Show MoreThis study intends to look into the activities instructors use in the classroom to teach literature. Three models for teaching literature were added into the study in order to deepen the use of activities in the classroom. They are six activities in the teaching of literature were listed as indicators investigated during the study; language based, paraphrastic, information-based, personal response, moral-philosophical, and stylistic. An emphasizing the teaching of literature, the classroom activities used were mostly concentrated on the technical aspects of reading, writing, listening, and speaking. Through observing the classroom, it was revealed that teachers employed more Language-Based activity, Moral-Philosophical activity, and Informa
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More