Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
This work involves hard photon rate production from quark -gluon plasma QGP interaction in heavy ion collision. Using a quantum chromodynamic model to investigate and calculation of photons rate in 𝑐𝑔 → 𝑠𝑔𝛾 system due to strength coupling, photons rate, temperature of system, flavor number and critical. The photons rate production computed using the perturbative strength models for QGP interactions. The strength coupling was function of temperature of system, flavor number and critical temperature. Its influenced by force with temperature of system, its increased with decreased the temperature and vice versa. The strength coupling has used to examine the confinement and deconfinement of quarks in QGP properties and inf
... Show MoreSuggestive ambiguity is a strategy of defense and maneuvering as it provides the speaker both protection and function. To put it differently, it helps the speaker to say whatever he likes and at the same time gives his opponents and friends the interpretation they desire. This is possible due to the flexibility of the linguistic expressions that the speaker uses. To be more clear, the context of situation, peoples' background and world knowledge interact with the significance of the linguistic expressions reaching an allusive situation where two interpretations, positive and negative, are available to the addressees. Such situation enables the addressers to implicate different ideas or messages, accusations, inciting violence, etc. The pres
... Show MorePublic-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show Morebackround: job satisfaction greatly determines the productivity and efficiency of human resorces for health job satisfaction in said to be linked with employees work environment
job resposibilties and time pressure among various health professionals
Back ground: The innervations of the pineal
gland from the superior cervical ganglion have
shown some form of a chromatolysis reaction.
Objective:
1-Tracing the innervations of the pineal gland by
removing the target tissue (the pineal gland in
this study) i.e. (pinealoctomy) and removal of the
superior cervical ganglion i.e. (ganglionectomy).
2- The localization and total number of the
neurons which project into the rat pineal gland
3-The effect of pinealoctomy on the SCG after a
different time interval.
Methods: Twenty five albino rats were used in
this study, Pinealoctomy was done, then after a
different time interval ganglionectomy was done,
in order to study the Chromatolysis in their cel
A total of 70 pregnant women with toxoplasmosis were studied to evaluate of some immunological aspects. The women were distributed into three groups: 37 women were IgG positive, 18 women were IgM positive and 15 women were IgG and IgM positive as well as 25 healthy women were considered as control group. Serum samples were collected and ELISA method was employed to assess levels of interleukins 4, 6, 10, Interferon gamma-induced protein 10 (IP-10), Granulocyte-macrophage colony-stimulating factor (GM-CSF) and Vascular endothelial growth factor (VEGF). As compared with control the levels of cytokines were significantly increased in serum of three pregnant women groups with toxoplasmosis and the highest increase was observed in the IgM positi
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More