Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through general description of these things. This paper utilizes these two principles to recognize and extract eye part from image. Java programming language and OpenCV library for image processing are used for this purpose. Good results are obtained from this proposed method, where 88.89% was obtained as a detection rate taking into account that the average execution time is about 0.23 in seconds.
Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show Moreتلعب الاعتمادات المستندية دوراً كبيراً وخطيراً في التجارة الدولية باعتبارها إحدى أوسع أدوات الدفع انتشاراً في العالم سواءاً كان ذلك بالنسبة للمستورد أم للمصدر وتغطيتها للمخاطر المحتملة لكلا الطرفين، فهي تؤمن للمصدر استلام قيمة البضاعة بالكامل عند تنفيذها لشروط العقد، ويسمح للمستورد بعدم الدفع إلا بعد إتمام شحن البضاعة وتقديم المستندات المطلوبة واستلامها.
وتقوم المصارف التجارية المحل
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More
Abstract:
The models of time series often suffer from the problem of the existence of outliers that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
Abstract
Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.
This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.
Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome
... Show More- المقدمهIntroduction
الخيارات أحدى الأدوات المالية المشتقة التي تشتق قيمتها من قيمة الموجود الأساسي
Underlying Asset، وقد يكون الموجود الأساسي سهما عاديا أو مؤشر أسهم أو عقد مستقبلية سلع أو عقد مستقبلية على أوراق المديونية . وبالرغم من أن الدلائل تشير إلى أن التعامل بالخيارات يعود إلى أوائل القرن السادس العشر الميلادي آلا انه ونتيجة للعديد من الابتكارات ال
The financial violation must be defined as a concept for the purpose of distinguishing this concept from other terms that may be suspected in the context of the job and the violations of the financial employee that may be disciplinary or even punitive. From Egypt and Iraq, in addition to addressing the doctrinal aspect in the two countries above and the extent to which the specialized jurists dealt with the statement of financial violations, or even highlighting images that could be considered that the violation committed by the financial employee falls under the framework of the financial violation. Which may result in a financial violation by the financial employee, and we touched upon the request of him to indicate the financial viola
... Show More