Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreThe topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The current study, performed during the period from February 2021 to June 2022 at the University of Thi- Qar/ College of Education for Pure Sciences, and aimed to follow the changes in external morphological features at different Embryonic developmental stages in pregnant rats treated with different doses of amlodipine. Usage In this study, 18 pregnant rats were randomly divided into three groups, each with six pregnant rats. Each group received different concentrations of amlodipine (0.3, 0.5) in oral doses until the 20th day of gestation, while the control group was injected with 0.9% normal saline. Teratomas are bizarre tumors derived from embryonic tissue that are normally found only in the gonadal and sacral regions of adults. Primary
... Show MoreAnger is one of the problems of scientific importance that psychologists and education scientists are interested in, especially societies and educational environments, because if a child’s anger continues to develop into violence, then it becomes an unusual behavior, and an indication of the child's lack of adaptation to his family and his environment (Moses, 2013: 4) &n
... Show MoreA simple, rapid and sensitive spectrophotometirc method for the determination of trace amounts of promethazine hydrochloride in the aqueous solution is described. The method is based on the complexation of promethazine hydrochloride with In (III) in the presence of sodium hydroxide to form an soluble product with maximum absorption at 304nm. Beer’s law is obeyed over the concentration range of (2- 20μg/ml) with molar absorptivity of (1.92× 103 L.mol-1 .cm -1 ). The optimum conditions for all development are described and the proposed method has been successfully applied for the determination of promethazine hydrochloride in bulk drug.
The paper generates a geological model of a giant Middle East oil reservoir, the model constructed based on the field data of 161 wells. The main aim of the paper was to recognize the value of the reservoir to investigate the feasibility of working on the reservoir modeling prior to the final decision of the investment for further development of this oilfield. Well log, deviation survey, 2D/3D interpreted seismic structural maps, facies, and core test were utilized to construct the developed geological model based on comprehensive interpretation and correlation processes using the PETREL platform. The geological model mainly aims to estimate stock-tank oil initially in place of the reservoir. In addition, three scenarios were applie
... Show MoreHere we present the results of experiments involving cynomolgus macaques, in which a model of traumatic spinal cord injury (TSCI) was created by using a balloon catheter inserted into the epidural space. Prior to the creation of the lesion, we inserted an EMG recording device to facilitate measurement of tail movement and muscle activity before and after TSCI. This model is unique in that the impairment is limited to the tail: the subjects do not experience limb weakness, bladder impairment, or bowel dysfunction. In addition, 4 of the 6 subjects received a combination treatment comprising thyrotropin releasing hormone, selenium, and vitamin E after induction of experimental TSCI. The subjects tolerated the implantation of the recording devi
... Show MoreThe aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of
... Show More