Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through general description of these things. This paper utilizes these two principles to recognize and extract eye part from image. Java programming language and OpenCV library for image processing are used for this purpose. Good results are obtained from this proposed method, where 88.89% was obtained as a detection rate taking into account that the average execution time is about 0.23 in seconds.
The regulatory authorities have implemented various standards to address the risks associated with credit facilities. One important aspect is the use of the Credit Bureau System (CBS), which plays a central role in ensuring banking soundness. Thus, the study seeks to explore the role of CBS in attaining banking soundness as a fundamental principle. The research sample consisted of three Iraqi banks spanning from 2010 to 2022. The research findings indicated that the implementation of CBS had a significant positive impact on achieving Banking Soundness (BS) rates in my bank. Furthermore, the asset quality index's value increased significantly, surpassing the standard value of 5%. It became evident that the banks needed to formulate a well-de
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThe current standard for treating pilonidal sinus (PNS) is surgical intervention with excision of the sinus. Recurrence of PNS can be controlled with good hygiene and regular shaving of the natal cleft, laser treatment is a useful adjunct to prevent recurrence. Carbon dioxide (CO2) laser is a gold standard of soft tissue surgical laser due to its wavelength (10600 nm) thin depth (0.03mm) and collateral thermal zone (150mic).It effectively seals blood vessels, lymphatic, and nerve endings, Moreover wound is rendered sterile by effect of laser. Aim of this study was to apply and assess the clinical usefulness of CO2 10600nm laser in pilonidal sinus excision and decrease chance of recurrence. Design: For 10 patients, between 18 and 39 year
... Show MoreIn this work, animal bones with different shapes and sizes were used to study the characteristics of the ground penetrating Radar system wares reflected by these bones. These bones were buried underground in different depths and surrounding media. The resulting data showed that the detection of buried bones with the GPR technology is highly dependent upon the surrounding media that the bones were buried in. Humidity is the main source of signal loss in such application because humidity results in low signal-to-noise ratio which leads to inability to distinguish between the signal reflected by bones from that reflected by the dopes in the media such as rock .
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
Acontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%) out of 54 analyzed vials were contaminated , most bacteria identi
... Show MoreNatural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show More