In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe effect of cognitive trips via the Internet (web quest) accompanying practical lessons in learning some basic handball skills for female students
Background: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi
... Show MoreSilver diamine fluoride (SDF) has shown effectiveness in hardening tooth structure and killing bacteria. Therefore, it can be used to prevent and arrest dental caries. Riva Star (SDF) treatment alone will stop cavities but will not reverse the cavitation. The Silver Modified Atraumatic Procedure, often known as Smart, is the optimum technique for regaining the tooth's structure and function. Glass ionomer was introduced in (1972) as a new material that has become one of the most widely used materials in restorative dentistry. By releasing fluoride ions, this material has a therapeutic impact on the surrounding tooth structure. Microleakage is the ingress of bacteria, its byproducts, toxins, chemicals, oral fluids, and ions between t
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreThis research deals with and which was entitled: relationship between psychological time and elements of filming expression (one-day event filmsas an example). It is about the relationship of psychological time (internal) with the elements of filming expression and how the time affected when using these elements in terms of its deceleration or acceleration. In particular, this research focus on elements that slow down time or stops it when using these elements. As one day time is short and heavy at the time of spectators in terms of the large number of film events which makes the viewer runs out of breath to understand the nature of those events and then identify the causes and consequences, as they occur in a short time (one day time) a
... Show More