Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
Helps to use the mechanics of organizational agility in improving product quality by reducing waste or reduce it by removing activities that do not add value, which is the main reason for inefficiency and low productivity and increase costs, so the difficulty of changing administrative decisions to cope with internal and external changes to keep up with market trends renewable are the basic issue that research seeks to be addressed through the adoption of mechanisms of organizational agility, which will be reflected in bottom line in a positive way in improving the quality of products, and thus lies Applied important to look at the light of the results achieved and in which they can know the nature of the relationship between the
... Show MoreMany risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected
The production of polyhydroxyalkanoates PHAs from biopolymer degrading bacteria was examined
Construction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreTicks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More