Preferred Language
Articles
/
bsj-4937
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Murabaha in Enhancing the Profitability of Islamic Banks Using the (ROA) Index: Applied research in Al-Nahrain Islamic Bank
...Show More Authors

The banking sector of all kinds is the backbone of the economy in all countries, as it is the main financier of most economic projects in order to achieve economic development and achieve stability, which contributes to providing the necessary resources in return for obtaining a profit margin in exchange for giving up his money and bearing credit risks. Among the aforementioned banking sectors are: Islamic banks that invest their capital in several forms in order to obtain profits that enable them to continue and grow, and the most important of these formulas is the Murabaha formula, which is summarized by the bank selling a commodity after owning it and then selling it to the applicant for this commodity based on a prior request

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 12 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ISOLATION AND IDENTIFICATION OF PSEUDOMONAS SP THAT PRODUCE LIPASE: ISOLATION AND IDENTIFICATION OF PSEUDOMONAS SP THAT PRODUCE LIPASE
...Show More Authors

15 local isolates of Pseudomonas were obtained from 35 samples from several sources such as soil, water and some high-fat foods. The ability of isolates to produce lipase was measured by the size of the clarification zone formed around the colonies on the lipase production medium and by measuring the enzymatic activity and specific enzymatic activity, the isolate M3 was found to be the most efficient for production of the enzyme, This isolate was identified by microscopic, morphological, some biochemical tests and genetic diagnosis of 16S gene sequences by using the (PCR) technique, and then comparing the results obtained with the National Center for Biotechnology Inform

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 14 2005
Journal Name
Iraqi Journal Of Laser
Bending Effect on the Single Mode Optical Fibers
...Show More Authors

Bending effects on the transmission of optical signal are investigated on a single mode
optical fiber (SMOF) of 10 m length, core radius of 5 μm and optical refractive index difference
0.003. The bending radii (R) were between 0.08 and 0.0015 m. A great decrease in the amplitude is
shown for radii below 0.01 m. Sudden break down occurs for radii less than 0.0015 m. Birefringence
(B) is difficult to measure for long fibers. Meanwhile, B was found by comparing with calibrated
fiber of the same properties but of length of 0.075 m. The results show an increase in propagation
constant (Δβ) and the decrease in beat length (Lb), and show that bending decreases the critical radius
of curvature (Rc) related to B. The chang

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS: VISUAL CONTAMINATION WITH RANDOM ADVERTISEMENTS AND THE POSSIBILITY OF APPLYING FINES TO THEIR OWNERS
...Show More Authors

Baghdad governorate has many areas of distinctive architectural and architectural character, which are heritage and valuable areas that we must preserve and take care of. But we see many manifestations of it, which have a negative impact on buildings, areas and roads, so that they distort the view and thus lead to visual pollution in general. The research examined the visual pollution from random advertising, which stretched buildings, walls, electricity poles and sidewalks. The study covered different areas of al-Karkh and al-Rassafa (Jadreya Bridge, Nation Square, Jordan Square, alkindy Street)Most of the distortions were the result of non-removable posters, Handwriting, election candidate adve

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تحديد وقت الصيانه الوقائية الامثل في شركة الهلال الصناعية المحدوده
...Show More Authors

The main target of this paper is to determine the optimum time for preventive maintenance on machines. Tow methods has been implemented estimating the optimum time duration for preventive maintenance . the first techniques use scheduling depending on data concerning the machine maintenance cost and halted cost from the production reach to the optimum time for maintenance which reflect the minimum cost. Where as the second techniques depends on reability function to estimate the optimum duration time which reflect the minimum cost. The tow techniques above by which we count on in fixing the preventive maintenance both give same result . we also prove that the scheduling method best than the reability function .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref