There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into the main sixteen blocks. Each block of these sixteen blocks is divided into more to thirty sub-blocks. For each sub-block, the SVD transformation is applied, and the norm of the diagonal matrix is calculated, which is used to create the 16x30 feature matrix. The sub-blocks of two images, (thirty elements in the main block) are compared with others using the Euclidean distance. The minimum value for each main block is selected to be one feature input to the neural network. Classification is implemented by a backpropagation neural network, where a 16-feature matrix is used as input to the neural network. The performance of the current proposal was up to 97% when using the FEI (Brazilian) database. Moreover, the performance of this study is promised when compared with recent state-of-the-art approaches and it solves some of the challenges such as illumination and facial expression.
This study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender, years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreSchiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an
... Show MoreBackground: Surface treatment of machined dental zirconia for enhancement of the adhesion to resin cement, using Er,Cr:YSGG Laser. Materials and Methods: Total number of 42 zirconia disc specimens (9 mm diameter, and 2 mm height) was sintered according to the manufacturer instruction. They are divided into six groups, each group of seven samples. Laser groups (Experiment parameters) were depend on laser total irradiation time, pulse duration, and power. Group (A): 20 sec., 60 µs pulse duration. Group (B): 30 sec., 60 µs pulse duration. Group (C): 40 sec., 60 µs pulse duration. Group (D): 20 sec., 700 µs pulse duration. Group (E): 30 sec., 700 µs pulse duration, with different powers used (1, 1
... Show Moreالسمخص يهجف البحث الحالي التعخف الى: -1 اعجاد مدتهى مقياس لمقيم العمسية . -2 ما العلاقة بين القييم العمسيية لبمبية قديم الايسيياك ييي لميية التخليية لمعميه الريخية/ ابين الهيي م جامعية – بغجاد. لتحقيق أهجاف البحث استخج الباحث السشهج الهصييي بدي م ملاتستيط لع يعية أهيجاف الج ا رسية لقيا الباحيث ب شياك مقيياس القييم العمسيية ايه مين 40 ( يقيخب بسقيياس لي ي ا خا الخساسيي الاييقد الاييق بذيجبد محايجد لا الايقد لا الاي
... Show Moreلقد كان للثورة الرقمية التي ظهرت في القرن العشرين أثر في إحداث تأثيرات جذرية تضمنت نواحي الحياة المختلفة، خصوصًا في المجال الإقتصادي، والتي تمثلت بثلاث صور ( الذكاء الإصطناعيArtificial Intelligence( AI) وإنترنت الأشياء Internet of Things والبيانات الضخمة Big Data ، وفيما يتعلق بالذكاء الإصطناعي، فقد تم إكتشافهُ في منتصف خمسينات القرن الماضي الذي تعد الولادة الحقيقية لهُ في المؤتمر الذي نُظم في الولايات المتحدة الأمريكية على يد
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreThis paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.