User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show Morerunning the requirement color important place in object of life activity both public and private, Fallon makes represents energy expressive and aesthetic in designing furniture street, especially (positions waiting buses passenger transport)which took looms large in attention receiver designer also, through civilized development and urban and change the city. Requirement, The positions of waiting progress jobs service and that would interact to produces Photos aesthetic Furniture for space street and understand receiver, affect the operation his life and the development of his environment and his psyche and culture of because they entity variable and sophisticated, impose on us to find foundations a design and conditions of chromatic esp
... Show MoreThe advertising has emerged as an effective force and an effective instrument upon with all organizations and companies depend on achieving their goals. In additional to the need to use promote sales, The nature and objective of advertising go beyond the scope of specific personal communication to a broader and more effective range for consumers from multiple groups and combination play need to use as well as the need to use means of communication than com convey the message more professional, The coincides with the rapid and remarkable development of all different media technologies and as much as possible social networking sites including mobile phone companies. The advertising has emerged as an effective force and an effective instrum
... Show MoreBackground: Concha bullosa is an anatomical variation which defined by pneumatizaton of middle turbinate that occurred with an incidence of (5 to 25%) in the normal population.It has the potential to cause crowding and obstruction of the middle meatus and nasal cavity. There are many surgical techniques which utilized for its management. Study goal: Is to compare the formation of adhesion between endoscopic partial lateral middle turbinectomy and middle turbinate trimming in cases of concha bullosa. Patients and methods: A prospectivecomparative clinical trial was performed in the ENT department at Al-Shahid Ghazi AL Hariri Hospital in Medical City over the period from September 2016 to August 2017. Fifty nine (59) patients {24 males
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreOvako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
To evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl
... Show More