Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More1.Chapter I (systematic framework) which includes: the research problem and the importance of the research, the need for it, the goals of the research, the temporal &spatial boundaries, determine the terms and defined procedurally.2.Chapter II - the theoretical framework: It consists of three sections are:•The first topic:- the concept of references and experimentation in the theater. •The second topic:- the director of academic and experimentation in Iraq. Two paragraphs in this section came after the introduction, in first paragraph to talk about the Iraqi theater academic and experimentation, and in the second paragraph the researcher spoke about the academic director of the Iraqi and experimentation. 3.Chapter III - Actions -
... Show MoreFraxinus ornus L. is considered as a special species that is frequently planted as a decorative tree in most of the country. The cross-sections of the root and stem are circular in shape and in the secondary growth stage, the vascular tissue in the root and stem consists of secondary xylem in radial rows and the type of vessels in the xylem are ring pours wood. Epidermal cells of leaves undulate on the upper and lower side, hairs are uniseriate and unicellular and the stomata appeared in the abaxial surface only is anomocytic type. The vertical-section of blade leaf includes upper epidermis and lower epidermis followed by the palisade layer and spongy layers. The cross-section of petiole horseshoe shape and the vascular bundles are cover
... Show MoreThe current study aimed to identify the morphological description of the domestic cat tongue; thus for this purpose, five domestic cats of both sexes were collected from the local markets of Baghdad governorate, and then the animals were anesthetized and the tongue was removed from them. Fresh tongue samples were fixed using formalin (10%), and the preserved samples were dyed with methyl blue. The results showed that the tongue is an elongated organ divided into three regions: a somewhat flat rounded apex, this region contains a central depression called the middle groove. The second region is the lingual body region represents the largest region of the tongue, whereas its last region, called the root which has a lingual prominence on it
... Show MoreBackground: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study.
To translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More