Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.
DEMs, thus, simply regular grids of elevation measurements over the land surface.The aim of the present work is to produce high resolution DEM for certain investigated region (i.e. Baghdad University Campus\ college of science). The easting and northing of 90 locations, including the ground-base and buildings of the studied area, have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from Quick-Bird satellite sensor (with spatial resolution of 0.6 m). It has been geo-referenced and rectified using 1st order polynomial transformation. many interpolation methods have been used to estimate the elevation such as ordinary Kriging, inverse distance weight
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
The possibility of predicting the mass transfer controlled CaCO3 scale removal rate has been investigated.
Experiments were carried out using chelating agents as a cleaning solution at different time and Reynolds’s number. The results of CaCO3 scale removal or (mass transfer rate) (as it is the controlling process) are compared with proposed model of prandtl’s and Taylor particularly based on the concept of analogy among momentum and mass transfer.
Correlation for the variation of Sherwood number ( or mass transfer rate ) with Reynolds’s number have been obtained .
This work aims to investigate the inhibition of vitality of Streptococcus mutans, which is the causative agent of caries. A 632.8 nm He-Ne laser with the output power of 4.5mW was used in combination with toluidine blue O (TBO) at the concentration of 50μg/ml as a photosensitizer. Streptococcus mutans was isolated from 35 patients if carious teeth. Three isolates were chosen and exposed to different energy densities of He – Ne laser light 3.8, 11.7, 34.5 and 104.1 J/cm². After irradiation, substantial reduction was observed in the number of colony forming units (CFU)/ ml. The reduction in the number of CFU was increasing as the dose increased.
A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
A finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.
This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThis researchable paper aims to focus of the role & mechanism of market makers in Iraqi stock market through analyzing its role in other Arabian as well as global stock ones, especially in current period through activate the use of bonds, shares, and trying to create a continued price balance. Then decreasing the opportunity having gaps between highest and lowest level without reasonable causes. In addition trying to deactivate the common decision without supported information. Moreover, this paper aims to explain the rules of increasing liquidity and having balance to lead the market into positive direction. Thus, for achieving the above-mentioned requirements, such conditions should be underlined by market makers as well as t
... Show MoreSludge worm samples were collected from the Tigers River sediment during the period from November 2018 to June 2019 in Al Sarafiya District/ Baghdad- Iraq. Biometric morphological measurements focusing on the form of penis sheath and chaetal morphology were used for species identification, in addition to molecular analysis by amplification of conserved 18s rRNA encoding gene using ITS1 and ITS4 universal primers.According to the morphological measurement records, the results revealed the existence of Limnodrilus hoffmeisteri Claparede 1862, L. claparedeianus Ratzel, 1868 and L. cervix Brinkhurst 1963. Other two groups of specimens, with short penis sheath, were identified by molecular technology as L