Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
PDBN Rashid, International Journal of Professional Studies, 2023
This research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreThe present study includs the isolation and identification of Keratinophilic fungi in fresh water samples collected from Tigris river in Baghdad, Iraq. Samples were collected from different districts of Baghdad (Al-Rustumia, Madina Al-Teb, Al-Azamia, Al-Kadimia, Al-Dorha and Al-Kanah). The water samples were examined for keratinophilic fungi by the plating method culturing and Hair Baiting Technique. A total number of 18 genera are recorded, in which the Tigris water indicates an impressive diversity of fungi. A variety of fungal strains were isolated from river water, out of 814 fungal colonies, Aspergillus terrus (5.5%) was the most frequent species, followed by Asperg
... Show MoreOne hundred of dialysis patients' mean age ( 51.18±8.28) years and one hundred healthy control group , where carried out from different hospitals of Baghdad city , during the period between November /2012 until March/2013. Blood samples were collected before dialyzing for estimation the concentration of urea, creatinine, uric acid, random blood sugar , calcium and cholesterol by enzymatic method detected spectrophotometerically.
The aim of this study is to determine concentration of urea, creatinine, uric acid, RBS , calcium and cholesterol in hemodialysis patients in Baghdad . The results showed that there were highly significant increases (P<0.01) in the mean of creatinine ,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Acontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%) out of 54 analyzed vials were contaminated , most bacteria identi
... Show MoreA sentence is a key part of Spanish grammar and serves as the fundamental unit in constructing discourse. However, foreign language learners, particularly Arabic speakers, may face complex aspects that hinder their understanding and correct use of sentences. Additionally, there are at least two linguistic approaches that describe the use of compound sentences: one considers the sentence as the basic unit for discourse analysis, while other studies, starting with Van Dijk (2003), emphasize the importance of understanding both the partial and holistic structure of discourse. Therefore, we consider the significance of reviewing the linguistic differences between the native language and Spanish as a potential cause of misunderstanding a
... Show MoreThis paper shows that there are few studies on errors and difficulties with unstressed pronouns in Spanish. Similarly, when consulting teaching methods, we find that the most consulted texts are ELE manuals. In this sense, the purpose of this paper is to verify the teaching proposal regarding unstressed pronouns in the ELE manuals most used at the Faculty of Languages - University of Baghdad, Iraq. It is urgently needed for ELE teachers in Iraq and students to obtain the most recent ELE manuals, as this will help them teach and learn about unstressed pronouns with texts that contain more didactic and engaging exercises. Furthermore, teachers will be able to plan strategies and lessons for the correct use of these texts.
The construction sector is considered an important and influential pivot in the national economy of any country. Nations are working to develop this sector, receiving modern and developed techniques. So, this sector can be a carrier or a receiver of modern technologies. The cost of technology transfer between the international companies that sponsor this sector is a matter of great importance, especially since different factors affect the need for this advanced technology. The cost of technology transfer in construction is related to multiple factors presented by Knowledge, equipment, plant, hardware and software. The lack of distinguishing and evaluating the direct and indirect costs in the construction sector during
... Show MoreDue to the significance of hospital drinking water, a study was done to assess the water in three hospitals in Baghdad (Al-Yarmouk Teaching Hospital, Ibn Sina Hospital, and Ibn-Al-Nafis Hospital) for its nature and quality, compare it to other hospitals in terms of its physical, chemical, and bacterial specifications, and compare it to international standards. According to Iraqi standards from 2009 and WHO standards from 2011, Chemical factors were measured, which included pH, Total Dissolved Solids (TDS), and Calcium Ion (Ca+2). Reported readings are all within acceptable ranges for drinking water. In contrast, turbidity, total hardness (T.H.), chlorides (Cl-), magnesium (Mg+2), the number of aerobic plates (APC), total coliform (T
... Show More