Preferred Language
Articles
/
bsj-4937
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 22 2020
Journal Name
2020 4th International Symposium On Multidisciplinary Studies And Innovative Technologies (ismsit)
Artificial Intelligence in Smart Agriculture: Modified Evolutionary Optimization Approach for Plant Disease Identification
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Active Vibration Suppression of Smart Cantilever Beam with Sliding Mode Observer Using Two Piezoelectric Patches
...Show More Authors

This paper presents a vibration suppression control design of cantilever beam using two piezoelectric ‎patches. One patch was used as ‎an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. ‎the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state ‎estimation error is proved bounded. An ‎optimal LQR controller is designed then using the ‎estimated states with the slid

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The role of metaphor in the embodiment of female images (In the novel by Ludmila Ulitskaya "Sincerely Yours Shurik" as model)
...Show More Authors

The research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th

... Show More
Publication Date
Wed Dec 31 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Pharyngeal airway volume and its relationship to the facial morphology in nasal breathing and mouth breathing subjects (A comparative computerized tomography study)
...Show More Authors

Background: The value of lateral cephalometric radiographs to evaluate the pharyngeal airway is limited because it provided 2-dimensional (2D) images of complex 3-dimensional (3D) anatomic structures. Three dimensional analyses of the airway volumes are required to understand oral and pharyngeal adaptations in mouth breathing and nasal breathing subjects. The aim of this study was to measure the pharyngeal airway volume and the size of the face, then compare between pharyngeal airway volume in mouth breathing and nasal breathing subjects and find the gender difference in each group, also to study the relation between pharyngeal airway volume and the size of the face. Material and Methods: Fifty patients including 28 males and 22 females wit

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Replacement Models On Determine the Optimal Time to Replacement
...Show More Authors

Abstract:-

            The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct  maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Design of Achromatic Combined Quadrupole Lens Using the Modified Bell-Shaped Field Distribution Model
...Show More Authors

The optimization calculations are made to find the optimum properties of combined quadrupole lens consist of electrostatic and magnetic lenses to produce achromatic lens. The modified bell-shaped model is used and the calculation is made by solving the equation of motion and finding the transfer matrices in convergence and divergence planes, these matrices are used to find the properties of lens as the magnification and aberrations coefficients. To find the optimum values of chromatic and spherical aberrations coefficients, the effect of both the excitation parameter of the lens (n) and the effective length of the lens into account as effective parameters in the optimization processing

View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors

Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref