Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.
This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreThe research aims to identify the importance of applying resource consumption accounting in the Iraqi industrial environment in general, and oil in particular, and its role in reducing the costs of activities by excluding and isolating idle energy costs, as the research problem represents that the company faces deficiencies and challenges in applying strategic cost tools. The research was based on The hypothesis that the application of resource consumption accounting will lead to the provision of appropriate information for the company through the allocation of costs properly by resource consumption accounting and then reduce the costs of activities. To prove the hypothesis of the research, the Light Derivatives Authority - Al-Dora Refin
... Show MoreThe objective of the current research is to identify the effective of the suggested instructional design that based on the teaching strategy for understanding in achievement for students(girls) of mathematics in the fifth grads secondary school. To achieve the research goal, the empirical research method is depended. In this method a realistic empirical design pre-test of two equivalent sets to determine the students’ grade is used. The following zero hypotheses is formulated “There is no statistical difference for the faction at 0.05 between the mean grad for the students of the empirical group who studied the subject using the Instructional design based on the teaching strategy for understanding and those who studied the same subje
... Show Moreمشكلة البحث :
تعد الادارة الجامعية عاملا مهما واساسيا في اكمال البناء المعرفي لشخصية الطالب الجامعي لما يمثله من قدرة على قيادة العملية التربوية والتعليمية والوصول بها الى تحقيق اهدافها . وطالما كانت هذه الادارة ممثلة ابتداء من رئاسات الاقسام ووصولا الى اعلى الهرم الاداري في الجامعة مهمة في تحقيق الاهداف العلمية والتربوية فان اختيار الاشخاص للقيام بمهامها تاخذ جانبا كبيرا ومهما وذلك للاثر
... Show MoreThe history of civilizations in the past centuries is a rich source for creativity and inspiration in all areas of art and design, especially in the field of fashion design. Many designers draw their designs from previous eras; which is the aim of this research as we propose designing fashion the mannequin for the category of young girls aged between (10-18). The costumes were inspired by Victorian women's costumes during the time period (1860-1890) and were subdivided into three time periods (1860-1870), (1870-1880), (1880-1890) forming three designs for each time period , analyzing the nine designs to achieve the creative , functional and aesthetic aspects that are appropriate for the age group (research sample). The importance of the
... Show Moreتهدف هذه الدراسة إلى محاولة التعرف على اثر كل من عرض النقود وسعر الصرف على معدل التضخم في الاقتصاد الليبي خلال الفترة 1990-2008. ولتحقيق ذلك فقد تم اختيار الرقم القياسي لأسعار المستهلك ليمثل معدل التضخم، وعرض النقود بالمفهوم الواسع ممثلا لعرض النقود، وسعر صرف الدينار الليبي مقابل الدولار الأمريكي ممثلا لسعر الصرف وقد أخضعت المتغيرات لاختبار السكون والذي تشير نتائجه إلى أن التضخم وعرض النقود وسعر الصرف
... Show MoreThe research aims to:
- Show the effect of corporate governance on the quality performance of certified public accountants through establish the concept and principles of corporate governance and the concepts, importance, standards of quality auditing.
- Forming a proposed framework for quality performance of certified public accountants under the corporate governance, which show the concepts objectives, principles, standards, and constraints of the proposed framework.
The research in one aspect of it based on the study of theoretical background which re which relate to the subject beside the global experiments and opinions of the specialists
... Show Moreيهدف البحث الحالي إلى التعرف على أثر الأسلوب القائم على القيود في تعلم مهارة الرمية الحرة وتحسين دقة التصويب في كرة السلة لدى طالبات كلية التربية البدنية وعلوم الرياضة. استخدمت الباحثة المنهج التجريبي بتصميم المجموعتين )التجريبية والضابطة( مع القياسين القبلي والبعدي، حيث تكون مجتمع البحث ) من ) 100 ( طالبة، وتم اختيار عينة مكونة من ) 30 ( طالبة تم توزيعهن عشوائيا إلى مجموعتين بواقع ) 15 طالبة لكل مجموعة. خضعت المجمو
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show Moreيناقش هذا البحث مشكلة التعدد الخطي شبه التام في انموذج الانحدار اللاخطي ( انموذج الانحدار اللوجستي المتعدد) ، عندما يكون المتغير المعتمد متغير نوعيا يمثل ثنائي الاستجابة اما ان يساوي واحد لحدوث استجابة او صفر لعدم حدوث استجابة ، من خلال استعمال مقدرات المركبات الرئيسية التكرارية(IPCE) التي تعتمد على الاوزان الاعتيادية والاوزان البيزية الشرطية .
اذ تم تطبيق مقدرات هذا ا
... Show More