Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
This research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in
... Show MoreSummery of the Study: The Israeli interest in Iraq was not the result of the 2003 US war, which ended with its occupation, but Iraq was still at the top of Israeli concerns, as it was due to its interest and desire to occupy the Zionist movement for a number of reasons, most importantly its religious position in the Jews and control It is a sacred religious duty, so Israel has employed all its organs, institutions, relations and espionage networks in order to penetrate it and perpetuate its existence, and succeeded in achieving its foreign policy objectives at a time when the area was open to it without opposition or competition thanks to its strategic alliance with the states Of the United States of America, which has been able to penet
... Show MoreThis study sheds light on female entrepreneurship in Palestine, and explores the reasons behind its relative weakness as compared with men, and with female entrepreneurship in other countries. This study aims at proposing effective policies and doable measures to enhance female entrepreneurship. Achieving this objective will carry significant impact on employment and economic growth at large, and increase women’s economic participation, scaling up their independence, and demonstrating their skills and abilities, and putting women on an equal footing with men. Furthermore, entrepreneurial activity has increasingly become one of the key drivers of economic development. An increased rate of entrepreneurial activities among women,
... Show MoreObjective: is to determine the level of awareness concerning the reproductive health among adolescent girls in
Baghdad City.
Methodology: A cross sectional study was performed in order to assess the level of awareness regarding reproductive
health among 180 adolescent school girls in the age 12-18 years from five secondary schools in Al-Seder Sector in
Baghdad city, the data was collected by direct interview using constructed questionnaire to obtain socio-demographic
characteristics and level of awareness related to reproductive health. The study started from September 2012 to
January 2013.
Results: the results show that the highest percentage of girls (47.7%) was in age (17-18) year's age, (54.5%) at 4th class
se
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More