Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
The research aims to examine the integration effect among resource consumption accounting (RCA) system and the enterprise resource planning (ERP) on both costs reduction and quality improvement. The study questioner form distributed to two different respondents as the unit of analysis. The research reached various conclusions most important of which is the integration relationship can help solve the special difficulties in managing the economic unit data. Moreover, the integration provides a clear picture of the causal relationships between resources, resource quantities, and associated costs
Numerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service
... Show MoreIn this study, different methods were used for estimating location parameter and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment estimation (ME),and approximation estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile as estimation for distribution f
... Show MoreThis paper aims to verify the existence of relationships between product innovation and the reputation of the organization. The study problem is that the State Organization for Marketing of Oil (SOMO) system is inflexible in terms of marketing procedures and needs innovative, unconventional methods in innovating its products and improving performance. The reputation of the organization. The importance of the study lies in that it is an attempt to raise the interest of SOMO in its approach to the research variables in order to enhance its competitive position in the future and improve the marketing business environment, which contributes to enhancing the reputation of the organization by product innovation. The study sample
... Show Moreتعد المحاسبة بشكل عام علماً لكنها ليست من العلوم الصرفة وإنما من العلوم الإجتماعية مما يتطلب للتعامل مع المواضيع المحاسبية الأخذ بنظر الاعتبار الأشخاص المعنيين بالموضوع سواء كانوا المعدين للمخرجات المحاسبية أي المحاسبين، أو الاطراف ذوي المصالح المعنيين والمستفيدين من هذه المخرجات أي المستخدمين، ويعد المحاسب جزءاً من العملية الاجرائية نفسها وبهذا يكون دوره مزدوجاً يجمع بين كونه القائم بالبحث والقي
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More