Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
The Research aims to understand Student's attitudes towards Academic
Cheating in the Technical College -Baghdad. The study was made on a sample of
(88) students in the fourth (final) year who were randomly selected from the every
scientific department in the college. The researchers prepared academic cheating a
questionnaire. The research results showed that. The results showed that there is a
strong trend among the students to reject the cheating phenomenon. ( 72.72%) of
the specimen groups do not see that there is a justification in cheating, on the other
hand the results determined the means and reasons for the cheating by the students
and the negative outcome of that phenomenon.
The research focuses,in the first place, on six fields.The most important one is
curriculum field which includes the revision of the current academic curriculums and
substitute them with recent ones, beside the rehabilitation of academic labs and factories by
providing them with modern scientific technologies employed in the world. Regarding the
economical field, it seeks to provide high-level training staffs to serve different social and
economical sectors through modern effective technological and scientific
curriculums.Whereas the social field assures the concern of different social classes who
deprived from the grace of higher education such as retirees and elderly people and to set-up
some educational and ent
Objective(s): To evaluate women's perceptions toward wellness. Methodology: A descriptive-evaluation design is employed through the present study to evaluate women's perceptions toward wellness in Baghdad City. A non-probability (purposive) sample of (140) woman is selected from three primary health centers in Baghdad City. A questionnaire, of (57) items, is designed and constructed for the purpose of the study. Split-half internal consistency reliability of the study instrument is determined through computation of Cronbach alpha correlation coefficient and the content validity of the instrument determined thr
Eugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More