Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
The research dealt with a topic that has been practiced and transmitted news in satellite channels in recent years a lot. That is to say the role of satellite channels in the culture of a protest. In general, this study aims to reach to know the extent of the impact of television, especially the impact of the programs that bear the contents of protest and remonstration on the public; and what can be resulted out of these programs as cognitive, emotional and behavioral effects as a result of the individual's exposure to these programs and their impact from the culture of pretense. In addition to that, the research was interested in explaining the role of Iraqi satellite channels in developing and cultivating such culture; and following up
... Show Moreنحو تعزيز المشاركة السياسية للطالبات الجامعيات الفلسطينيات
The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreThe follower of the needs of the users of accounting information notices the necessity of adopting faithful representation of information Hence, IASB adopted the economic substance approach as the basis for the Formulation and development of international accounting standards Therefore, this research discusses the reflection of the economic phenomenon in terms of its economic substance on the subject of measurement , And it should be consistent measurement method where the problem of research is concentrated in the fact that the economic units operating in the local environment to address events and economic phenomena according to the legal form , as appropriate With the requirements of the unified accounting sys
... Show Morethe appearance and increasing of the young immigration within 2015, the researcher intuition as a mother and part of the society, and the role of the psychological attitude in enabling the individual to make decision, in the light of all the above come up the need for studying this problem.
The study aims at finding out:
1. The mental strain of the study sample.
2. The differences in mental strain of the study sample according to the gender, specification, the university, the study (private, not private), and if they have immigrated friends or relatives out of the Iraq.
3. The study sample attitudes towards immigration.
4. The study sample levels of attitudes towards immigration.
5. The differences in the sample attitud
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreIn the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreThe research deals with the impact of the nature of social and political formation in the orientation towards extremism through tracking the institutions and beliefs that the individual is going through. The role of the family, the group, the school, education, and religion has been touched upon in acquiring the trends of extremism, whether publicly or covertly, Focusing on the social and economic contexts that are an incubator environment for extremism supported by the form of the group and the beliefs it espouses, whether direct through religion or indirectly through the nature of education, this study relied on political literature that addressed this The topic, which focused on the phenomenon of extremism that swept the world recentl
... Show MoreA single-crystalline semi-polar gallium nitride (11-22) was grown on m-plane (10-10) sapphire substrate by metal organic chemical vapor deposition. Three-step approach was introduced to investigate the grain size evolution for semi-polar (11-22) GaN. Such approach was achieved due to the optimized gallium to ammonia ratio and temperature variations, which led to high quality (11-22) oriented gallium nitride epilayers. The full width at half maximum values along (-1-123) and (1-100) planes for the overgrowth temperature of 1080°C were found to be as low as 0.37° and 0.49°, respectively. This was an indication of the enhanced coalescence and reduction in root mean square roughness as seen by atomic force microscopy. Surface analysi
... Show More