Preferred Language
Articles
/
bsj-4937
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
A Comparative Study between Computer Textbooks Content in the Secondary Stage and Computer Textbooks Content in the University Stage in Colleges of Education at Baghdad University
...Show More Authors

Record, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).

View Publication Preview PDF
Publication Date
Fri Jan 23 2026
Journal Name
Journal Of Physical Education
Platform proposal impact in the development of some special physical abilities in the level of achievement of ran (1500) meters of the young players in athletics.
...Show More Authors

View Publication
Publication Date
Mon Feb 01 2021
Journal Name
International Medical Journal
Use of immunohistochemistry and silver in situ hybridization (Sish) in evaluation of human epidermal growth factor receptor2 (HER2/neu) status in Iraqi patients with breast cancer
...Show More Authors

Breast cancer is the commonest cause of cancer related death in women worldwide. Amplification or over-expression of the ERBB2 (HER/neu) gene occurs in approximately 15-30% of breast cancer cases and it is strongly associated with an increased disease recurrence and a poor prognosis. Determination of HER2/neu status is crucial in the treatment plan as that positive cases will respond to trastuzumab therapy. It has been used to test for HER2/neu by immunohistochemistry as a first step and then to study only the equivocal positive cases (score 2+) by in situ hybridization technique. The aim of our study is to compare between immunohistochemistry and silver in situ hybridization (SISH) in assessment of human epidermal growth factor (HER2/neu)

... Show More
Preview PDF
Scopus
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Cytotoxic Activities, Determining Toxin, and Molecular Docking of Ovary Pufferfish (Tetraodon leiurus) in Singkarak Lake as Cancer Chemoprevention Candidate
...Show More Authors

The primary toxin class discovered in freshwater pufferfish is a category of neurotoxins called PSTs (Paralytic shellfish toxins) and pufferfish toxin has been observed to have biological, biochemical, and cytotoxic effects on cancer cell lines. Therefore, it is crucial to determine the cytotoxic activity, toxins present in the ovary of T. leiurus, and interaction between ligand (toxin compound) and receptors test. This study used the MTT method in the T47D cell lines, liquid chromatograph-tandem mass spectrometry (LC-MS/MS), and analysis of the molecular interaction using molecular docking. The ovary of T. leiurus had cytotoxicity on the T47D cell, having an IC50 value of 229.535 μg/ml, and generated a chroma

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Political Marketing and the Formation of Trends in Public Opinion on Social Networking Sites: An Analytical Study of the Two F.B. Pages: the Prime Minister and the Parliament President
...Show More Authors

The social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE POSSIBILITY OF THE APPLICATION OF ENVIRONMENTAL FINES TO REDUCE THE WASTE GENERATED FROM THE SHOPE AND RESTAURANTS IN THE CITY OF BAGHDAD/ CASE STUDY.: THE POSSIBILITY OF THE APPLICATION OF ENVIRONMENTAL FINES TO REDUCE THE WASTE GENERATED FROM THE SHOPE AND RESTAURANTS IN THE CITY OF BAGHDAD/ CASE STUDY.
...Show More Authors

The research aims to identify the possibility of applying environmental fines to commercial shops and restaurants to reduce the environmental pollution represented by the wastes generated from them. The research sample was divided into two groups, including the first (20) commercial shops (meat shops and slaughter it, fruits & vegetables, legumes and accessories) and second (30) Restaurant in the city of Baghdad on both sides of Karkh and Rusafa. The quality of the waste was classified into carton, plastic, aluminum, glass, paper, cork and food waste. The study revealed the possibility of applying environmental fines to restaurants and shops to reduce the waste generated from them throughout the year and to apply continuous monitorin

... Show More
View Publication Preview PDF
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Employ Computer Technology (Power Point( For Development of Technical Skills for Students of Education Technical Material in Colors: اخلاص هاشم عودة
...Show More Authors

Resulted in scientific and technological developments to the emergence of changes in the educational process and methods of teaching modern formats commensurate with the level of mental retardation. Which called for educational institutions, including the University of Baghdad / College of Fine Arts to urge and guide researchers to study and follow-up of recent developments in the educational process in order to develop in the fine arts in general and technical education in particular being play an important role in achieving educational goals. The educational methods of modern educational require effort-intensive and advanced for the development of technical skills among students, and thus worked researcher to employ computer technology

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
The Economic Role of Sultan Al-Nasir Muhammad Ibn Qalawun in Egypt and the Levant Documentary Study through Writings and Inscriptions
...Show More Authors

The people lived under Mamluk rule, distress, poverty, famines, oppression of princes, rulers, And their domination and he always wished for a just ruler to relieve his misery, and remove the injustice

from him, so they found in Al-Nasser Mohammed tend to establish justice.

When Al-Nasser ascended the throne of the Sultanate, there was a rise or fall in prices, so he pursued Prices will end and punish those

who come out for it. And you talk about this search for a relationship

Sultan Al-Nasser with the poor classes in society and his keenness to pursue their affairs was compassionate On them, mer

... Show More
View Publication Preview PDF