Preferred Language
Articles
/
6BiPI5cBVTCNdQwCupWG
INTELLIGENT INTERNATIONAL IDENTIFICATION CARD
...Show More Authors

This study will develop and implement the International Identification Card (IIC) to multi users (M-1). The IIC can be used in several methods such as an IC card, Passport, driver’s license, Visa card, Security Information system, Business part, all information about individuals/persons. The Smart Identification Card Technology (SICT) system will be using several new technology categories/tools such as Information Technology, Management Information Technology, Database management, internet service, Bluetooth service, NFC and mobile calling service. The target of SICT is to increase the efficiency of IC card to know the details for all citizens and foreigners from any country regardless their nationalities. What this means is the citizen’s national and/or international security check can be identifiable, accessible from anywhere and anytime without time and/or location considerations. Therefore, any criminal behavior records and any other required checks can be accessed by the governments and authorities. The advantages of implementing this technology are to reduce the cost and time of history checkup of the person and aggregate Multi-IDs to one SICT. This new technology system will result a magnificent change, this will includes the person's (passenger's) passport information as well. Therefore, passengers can use their IIC for check in and out processes instead of using traditional passport. This new implementation of technology will assist the governments and citizens around the world without any delay in the service securely.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Isolation and Identification of Local Bactria Produced from Soil-Borne Urease
...Show More Authors
Abstract<p>The hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
2018 2nd International Conference On Imaging, Signal Processing And Communication (icispc)
Analogy-based Common-Sense Knowledge for Opinion-Target Identification and Aggregation
...Show More Authors

The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Comparison between the efficiency of serological tests for Identification of Brucellosis
...Show More Authors

Five serological methods for detection of Brucella were compaired in this study, Four of the methods are commonely used in the detections:- 1-Rose-Bengal: as primary screening test which depends on detecting antibodies in the blood serum. 2-IFAT: which detects IgG and IgM antibodies in the serum. 3-ELISA test: which detects IgG antibodies in the serum. 4-2ME test: which detects IgG antibodies The fifth methods. It was developed by a reasercher in one of the health centers in Baghdad. It was given the name of spot Immune Assay (SIA). Results declares that among (100) samples of patients blood, 76, 49, 49, 37, and 28. samples were positive to Rose Bengal, ELISA, SIA, 2ME and IFAT tests, respectively. When efficiency, sensitivity and specific

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochem. Cell. Arch
ISOLATION, IDENTIFICATION AND EVALUATION OF LACTIC ACID BACTERIA AS ANTIBACTERIAL ACTIVITY
...Show More Authors

Five species of Lactic acid bacteriawere isolated from raw milk, yoghurt, vegetables and pickles, Lactobacillus plantarum, Lactobacillus acidophilus, Lactobacillus brevis, Lactobacillus casei and Lactobacillus bulgaricus isolates were identified by 16S rRNA gene. Evaluate of antimicrobial activity against all the bacterial strains Staphylococcus aureus, Salmonella spp., Pseudomonas fluorescens, Escherichia coli, Bacillus cereus and Bacillus subtilis. It showed that bacteriocin of Lactic acid bacteriamore effective than supernatant of lactic acid bacteria, the results showed that isolatemost efficient isolate belonging to Lactobacillus brevis, the diameter of the inhibition of the bacteriocin of Lactobacillus brevis were 27.7, 26.3 and 25.1

... Show More
Scopus (5)
Scopus
Publication Date
Fri Nov 25 2022
Journal Name
Tem Journal
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques
...Show More Authors

The Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute

... Show More
View Publication
Scopus (9)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Identification of Acinetobacter baumannii and Determination of MDR and XDR Strains
...Show More Authors

The current study focuses on the bacterium Acinetobacter baumannii due to its importance as a nosocomial infections source in addition to its increased resistance against antibiotics. Different clinical and hospital environment samples were collected, and cultured on A. baumannii selective media: Leed Acinetobacter agar and Herellea agar. A. baumannii have been identified by traditional methods, followed by confirmation using molecular identification to detect blaoxa-51 like gene which is considered a diagnostic gene since it is present in genome of all A. baumannii strains. The result was, nineteen bacterial isolates of A.baumannii were obtained, from twenty-seven suspected isolate

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 29 2020
Journal Name
International Journal Of Innovation, Creativity And Change
A Pragma-Linguistic Study of Deontic Modals in the Language of International Contracts.
...Show More Authors

Deontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro

... Show More
Publication Date
Mon May 27 2024
Journal Name
Pakistan Journal Of Criminology
The Liability of Maritime Carrier under the Iraqi Transport Law and International Conventions
...Show More Authors

Everywhere carriers incur a measure of liability for the safety of the goods. Carriers are liable for any damage or for the loss of the goods that are in their possession as carriers unless they prove that the damage or loss is attributable to certain excepted causes. Damaged and lost items can unfortunately be a common problem when shipping freight. Legal responsibilities arise due to loss or damage during transit while cargo is in their care. This study intends to investigate the nature of the liability of the maritime carrier when this liability is realized, and the extent to which it can be paid or disposed of given the risks realized from the transportation process, which may result in damage or loss of the goods, and the damag

... Show More
View Publication Preview PDF
Scopus Crossref