Preferred Language
Articles
/
bsj-4937
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no camera installed and possibly by persons whose photos have never been kept in any official database prior to the event. During subsequent investigations, the authorities thus had to rely on traumatized and frustrated witnesses, whose testimonial accounts regarding suspect’s appearance are dubious and often misleading. To address this issue, this paper presents an application of a statistical appearance model of human face in assisting suspect identification based on witness’s visual recollection. An online prototype system was implemented to demonstrate its core functionalities. Both visual and numerical assessments reported herein evidentially indicated potential benefits of the system for the intended purpose.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Thu May 30 2019
Journal Name
Journal Of Legal Sciences
The exception from the rule of annexation of ownership in French law
...Show More Authors

The owner and possessor may meet in one person, thus who have these property they have its fruit. But in sometimes the owner is different than possessor, this happen in case the original owner succeeds in recovering his property or right. About that the legislations differed on the determination the person who deserves the fruits and whether the possessor is bona fide or mala fide. This paper is focused on the idea of the excluded from the rule of possession of the thing. And the applications of the rule (acquisition by possession) that belong to modern Roman law also the standpoint of Iraqi law.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
P the commercial activity of the city of Ghana in the fif
...Show More Authors

The city of Ghana is one of the important commercial cities in the country of Sudan, as it was a major source of commercial exchanges, and a commercial mediator across the countries of the Maghreb and the metropolises of the countries of Sudan. Many, and most of them take the desert road,    Which traders had to endure the hardships of these roads from the insecurity, high winds and dust that sometimes destroyed the trade convoys, in order to obtain gold, which is one of the most important minerals that Ghana traded with various countries, in addition to the different goods that the merchants carried In particular, salt and its trade with Ghana, and also taxes, which were an important financial resource imposed by some gov

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Journal Of Legal Sciences
Fighting the Information Forgery Crime in the Light of the Comparative Laws
...Show More Authors

Legislation may be often not enough for protecting information, and regulatory strategies are insufficient as well. Technical means are not also sufficient in preventing risks threating information whatever their effectiveness is. Thus, the protection is a complex structure consisting of law, regulation strategy and technology. The increasing use of and reliance on computer information systems has highlighted the need for good information system management. Legislative control can have a positive effect on this system by providing deterrence and increasing the public awareness of users about the problem.

Consequently, it is required looking for legislative means at the time in which the fight is more effective against this kind o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 14 2018
Journal Name
Journal Of Legal Sciences
Authentic Judgments in the Judiciary International Criminal Court And its implementation mechanism
...Show More Authors

      بعد الانتهاء من مرحلة المحاكمة وصيرورة الحكم نهائياً  فى المحاكم الجنائية الدولية ، تأتي مرحلة تنفيذ هذه الاحكام التي تصدرها المحكمة، ومدى حجيتها ازاء القضاء الوطني ، واستنادًا إلى مبدأ التكامل فإن الأحكام التي تصدرها المحكمة الجنائية الدولية يكون لها الحجية إزاء القضاء الوطني، وإزاء المحكمة الجنائية الدولية ذاتها؛ حيث لا يجوز محاكمة الشخص عن الجريمة ذاتها مرتين سواءً أمام المحكمة ال

... Show More
View Publication
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Imam Saeed bin Jubair and his efforts in the transcriber and copied
...Show More Authors

The study showed that Imam Said bin Jubair narrated in the transcriber and copied, which took most of the ink of the nation Ibn Abbas (may Allah be pleased with them), which amounted to fourteen novels.
The study also pointed out that the science of transcriber and copied is from the science of the Koran, which can only prove by the novel and the correct transmission of the Prophet Muhammad .
The study also showed that Imam Saeed bin Jubair, who says that it is permissible to copy in the Koran, contrary to what some scholars said that it is not permissible to copy.
The study also pointed to the possibility of copying and that the highest copies of the Koran Koran.

View Publication Preview PDF
Publication Date
Mon Sep 02 2019
Journal Name
Journal Of Legal Sciences
The physical corner of the crime of recruiting children in armed conflict
...Show More Authors

Children are considered the most affected group in armed conflicts because of the diversity and diversity of the forms of aggression against them.Their recruitment into armed conflicts is one of the most dangerous images.                                              

Therefore, the use of children in armed conflicts, it is not a modern phenomenon that is confined to contemporary armed conflicts, but has been used in ancient wars and different times and civilizations.       &

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Deification of kings and the phenomenon of alternative king in ancient Iraq
...Show More Authors

Faith is a feature of the Mesopotamian population, since the ancient Mesopotamian was a believer and obedient to his God in any case, and this encouraged the emergence of some of the phenomena interpreted by historians as an integral part of the civilization and ancient history of this country, and these phenomena are the phenomena of the deification of kings for themselves, The first phenomenon was a personal endeavor for the uniqueness of power, sometimes to correct some mistakes in societies to balance the state, and civil rule is independent of religious rule, and the second was the result of divination and predictions of omen, in the case of any bad harbinger of the king, such as the occurrence of eclipse To the sun or a lunar eclip

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The Logic of Freezers and Animals in the Holy Quran: (Objective study
...Show More Authors

The Logic of Freezers and Animals in the Holy Quran

View Publication Preview PDF