Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris database v1 using MATLAB 2017a. This method has high accuracy in the center and radius finding reaches 97% for 2268 iris on CASIA V4 image and 99.77% for 2240 iris images on IITD, the speed is acceptable compared to the real-time detection speed and stable performance.
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
An advertisement is a human activity as old as human societies. As it was practiced by each society in accordance with the circumstances of the times and the means of communication available. The evolution of advertisement in the modern era reflected many factors to become an essential part of the lives of individuals in the world. Interesting in television advertising has increased in particular because it is the first and most influential mass media in the minds of people.
Advertisements play a big role in our lives as individuals. As advertisements surround us where we have been found; and bring us many benefits; as well as their contribution to accelerate the process of economic development a
... Show MoreSeries of new complexes of the type [M2 (L)Cl4 ] are prepared from the new ligand[N1 ,N4 -bis(benzo[d]thiazol-2- yl)succinamide (L) derived from ethan-1,2-dicarbonyl chloride and 2-aminobenzothiozole,where, M= Ni(ii), Cu(ii) and Zn(ii) alsocomplexes of mix-ligands, the type [M(L)(8-HQ)]Cl, where, M = Ni(ii), Cu(ii) and Zn(ii),8-HQ= 8-Hydroxyquinoline. Chemical forms are obtained from their 1 H, 13CNMR, Mass spectra (for (L)), FT-IR and U.V spectrum, melting point, molar conduct.Using flame (AA), % M is determined in the complexes.The content of C, H, N and S in the (L) and its complexes was specified. Magnetic susceptibility and thermal analysis (TGA) of prepared compounds were measured.The propose geometry for all complexes[M2 (L)Cl4 ] wa
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreThe current study was designed to investigate the occurrence of aflatoxin B1 in thirty two samples of fish feedstuff were collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin B1 was detected in thirty samples and the concentration of toxin ranged from 50 ppb to 1000 ppb.
Microwave and ozone were used for detoxification of aflatoxin B1 from sample with highest concentration (1000 ppb), two degree of temperature and two times (50°C and 100°C for 5 minute and 10 minute to each degree) of microwave, also two doses and two times (2 g and 4 g for 5 minute and 10 minute to each dose) of ozone gas were used.
Degradation of aflatoxin B1 by
... Show More