Preferred Language
Articles
/
bsj-4937
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Annals Of Medicine And Surgery
Assessment of the difficulties in laparoscopic cholecystectomy among patients at Baghdad province
...Show More Authors

Scopus (7)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

View Publication
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Subclinical Hypothyroidism in Obese Iraqi Patients Attending Obesity Research and Therapy Unit
...Show More Authors

ABSTRACTBackground Subclinical hypothyroidism is mild thyroid hormone deficiency, defined by elevation of serum thyroid-stimulating hormone concentration despite a normal free T3, free T4 level, can be distinguished by clinical and circumstantial observations from other conditions that cause this constellation of laboratory findings. The aim is to find the prevalence, anthropologic, and metabolic changes associate subclinical hypothyroidism(SH) in adult patients presented to obesity research and therapy unit (ORTU Objective: To find the prevalence of subclinical hypothyroidism (SH) in adult obese patients presented to obesity research and therapy unit (ORTU) in AL-Kindy College of medicine and to describe the anthropologic and metabolic

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering Science And Technology
A proposed dual size design for energy minimization in sub-threshold circuits
...Show More Authors

Sub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim

... Show More
Preview PDF
Scopus
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The impact of advancing age on total serum IgE in asthmatic patient
...Show More Authors
 

Abstract

The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses

... Show More
Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Evaluation of humoral immunity in Golden Hamsters experimentally infected with Leishmania donovani
...Show More Authors

This study has evaluated the humoral immune response in Golden Hamsters experimentally infected with Leishmania donovani along (4) times of follow up (15, 30, 60, 90) days after infection. Indirect haemagglutination test was used to determine the antibody titer through the various stages of the study. Also the progress of the infection was studied depending on some of the visceral changes caused by the parasite, like weight of liver, length & weight of spleen & the count of Leishmania parasites in spleen were measured. Results has shown that there was an increase in antibody titer & the maximum value was recorded at the 4th day of follow up (90 days after infection) as well as that there was an increase in the length of the spleen, weight

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Improvement of Traffic Movement for Roads Network in Al-Kadhimiya City Center
...Show More Authors

Numerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
The Efficacy of fractional CO2 laser in management of surgical wound scars
...Show More Authors

Background: Atrophic postoperative and traumatic scarring are common cosmetic problems for patients. Combining CO2 laser ablation with a fractional photothermolysis system in a treatment known as ablative fractional resurfacing fulfilling the new demands for a lesser risk of side effects and minimal or no downtime.Objective: To assess the safety and efficacy of ablation fractional CO2 laser treatments for surgical scarring .methods: Twenty one patient ( 14 women, and 7 men ) with various skin types , I to IV , aged 3 to 48 years , presents with 24 scars between June and December 2012 , four patients excluded from study because they are not continued in follow up , the remaining 17 patient completed all 3 treatments & 6 months follow

... Show More
View Publication Preview PDF