Preferred Language
Articles
/
bsj-4610
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through general description of these things. This paper utilizes these two principles to recognize and extract eye part from image. Java programming language and OpenCV library for image processing are used for this purpose. Good results are obtained from this proposed method, where 88.89% was obtained as a detection rate taking into account that the average execution time is about 0.23 in seconds.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحليل حسابات الاعتمادات المستندية دراسة نظرية – تطبيقية في مصرف الرشيد – بغداد للفترة من 2004 – 2006 المالية
...Show More Authors

تلعب الاعتمادات المستندية دوراً كبيراً وخطيراً في التجارة الدولية باعتبارها إحدى أوسع أدوات الدفع انتشاراً في العالم سواءاً كان ذلك بالنسبة للمستورد أم للمصدر وتغطيتها للمخاطر المحتملة لكلا الطرفين، فهي تؤمن للمصدر استلام قيمة البضاعة بالكامل عند تنفيذها لشروط العقد، ويسمح للمستورد بعدم الدفع إلا بعد إتمام شحن البضاعة وتقديم المستندات المطلوبة واستلامها.

وتقوم المصارف التجارية المحل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Computer Science Issues (ijcsi)
Near Rough and Near Exact Subgraphs in Gm-Closure spaces
...Show More Authors

The basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.

Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
A field study of the problems of queues at some checkpoints in the city of Baghdad
...Show More Authors

 

Abstract

Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.

This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.

Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
أستخدام نظرية الخيارات في أدارة المخاطرة في المصارف الأسلاميه دراسه نظريه- أستطلاعيه في المصرفين الأسلاميين في الأردن
...Show More Authors

- المقدمهIntroduction    

الخيارات أحدى الأدوات المالية المشتقة التي تشتق قيمتها من قيمة الموجود الأساسي
Underlying Asset، وقد يكون الموجود الأساسي سهما عاديا أو مؤشر أسهم أو عقد مستقبلية سلع أو عقد مستقبلية على أوراق المديونية . وبالرغم من أن الدلائل تشير إلى أن التعامل بالخيارات يعود إلى أوائل القرن السادس العشر الميلادي آلا انه ونتيجة للعديد من الابتكارات ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Planner And Development
التحليل التركيبي للبنية الحضرية باستخدام نظرية تركيب الفضاء
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
University Of Northampton Pue
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Thu Aug 15 2019
Journal Name
Scholarspace
Folklore as Resistance in Postcolonial Narratives and Cultural Practices: Hawaiian, African American, and Iraqi
...Show More Authors

Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Medical service quality, Dimensions the quality of service, satisfaction with medical service
...Show More Authors

 

 the Objective of  study is  to measure the quality of medical service level,  in the  Iraq public hospitals ,presented by  special words ,private hospitals, and compare between them, by knowing the level of recipients satisfaction  of medical service for all dimensions of quality service, and then measuring satisfaction with the quality of medical service as a whole for both of them, which have been prepared in questionnaire form, included two main directions, first to determine the level of satisfaction when, recipients of medical service is not dimensions quality of service in accordance with the Scale Servqual by (Parasurman et .al 1988), consisting of five di

... Show More
View Publication Preview PDF
Crossref