Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
Record, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
Breast cancer is the commonest cause of cancer related death in women worldwide. Amplification or over-expression of the ERBB2 (HER/neu) gene occurs in approximately 15-30% of breast cancer cases and it is strongly associated with an increased disease recurrence and a poor prognosis. Determination of HER2/neu status is crucial in the treatment plan as that positive cases will respond to trastuzumab therapy. It has been used to test for HER2/neu by immunohistochemistry as a first step and then to study only the equivocal positive cases (score 2+) by in situ hybridization technique. The aim of our study is to compare between immunohistochemistry and silver in situ hybridization (SISH) in assessment of human epidermal growth factor (HER2/neu)
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThe primary toxin class discovered in freshwater pufferfish is a category of neurotoxins called PSTs (Paralytic shellfish toxins) and pufferfish toxin has been observed to have biological, biochemical, and cytotoxic effects on cancer cell lines. Therefore, it is crucial to determine the cytotoxic activity, toxins present in the ovary of T. leiurus, and interaction between ligand (toxin compound) and receptors test. This study used the MTT method in the T47D cell lines, liquid chromatograph-tandem mass spectrometry (LC-MS/MS), and analysis of the molecular interaction using molecular docking. The ovary of T. leiurus had cytotoxicity on the T47D cell, having an IC50 value of 229.535 μg/ml, and generated a chroma
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThe social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o
The research aims to identify the possibility of applying environmental fines to commercial shops and restaurants to reduce the environmental pollution represented by the wastes generated from them. The research sample was divided into two groups, including the first (20) commercial shops (meat shops and slaughter it, fruits & vegetables, legumes and accessories) and second (30) Restaurant in the city of Baghdad on both sides of Karkh and Rusafa. The quality of the waste was classified into carton, plastic, aluminum, glass, paper, cork and food waste. The study revealed the possibility of applying environmental fines to restaurants and shops to reduce the waste generated from them throughout the year and to apply continuous monitorin
... Show MoreResulted in scientific and technological developments to the emergence of changes in the educational process and methods of teaching modern formats commensurate with the level of mental retardation. Which called for educational institutions, including the University of Baghdad / College of Fine Arts to urge and guide researchers to study and follow-up of recent developments in the educational process in order to develop in the fine arts in general and technical education in particular being play an important role in achieving educational goals. The educational methods of modern educational require effort-intensive and advanced for the development of technical skills among students, and thus worked researcher to employ computer technology
... Show MoreThe people lived under Mamluk rule, distress, poverty, famines, oppression of princes, rulers, And their domination and he always wished for a just ruler to relieve his misery, and remove the injustice
from him, so they found in Al-Nasser Mohammed tend to establish justice.
When Al-Nasser ascended the throne of the Sultanate, there was a rise or fall in prices, so he pursued Prices will end and punish those
who come out for it. And you talk about this search for a relationship
Sultan Al-Nasser with the poor classes in society and his keenness to pursue their affairs was compassionate On them, mer
... Show More