User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
Abstract The current study is a theoretical study that aims to underline the role of picture books as a serious genre of children's literature in raising children's understanding of English literature and life concepts; especially for non-English speakers. Unfortunately, most Iraqi people have developed a social phobia of learning English since childhood. This phobia is resulted from the heavy traditional reading and writing assignments as well as hard exams. Therefore, this study suggests incorporating more interesting literary material like picture books that would bring pleasure and help in raising children's love and cognition of English Language. More significantly, it calls to replace the old curriculum with a more vital
... Show MoreAbstract The purpose of this paper is preparing exercises according to some biomechanical variables for women with low back pain and identifying the effect of exercise according to some biomechanical variables and relieving lower back pain for women. The researchers used the one-group experimental design. The sample was chosen by the intentional method to provide the necessary conditions for conducting the study, and they represent the research community and its sample. The researchers also excluded (2) of the injured women because they did not adhere to the rehabilitation sessions, and for the purpose of ensuring the homogeneity of the sample members, the researchers used the arithmetic mean, standard deviation, and the torsion coefficient
... Show MoreThe aim of this study was to identify the rate of return of the stock through the financial information disclosed by the financial statements of companies both services and insurance included in Iraqi market for securities . The study used a descriptive statistical methods and the correlation matrix for the independent factors , in addition to a regression model for data analysis and hypothesis . Model included a number of independent variables , which was measured in the size of company (sales or revenue) , and the leverage , in addition to the structure of assets and the book value of owners' equity in the company , as well as the general price index .Based on the data of (11)companies and for three years, showed the result
... Show MoreThe current research aims to identify the contributions of small income-generating projects in theempowerment of rural women in Nineveh Governorate ,Al-Hamdaniya district, as a simplerandom sample was drawn from the research community of 280 respondents , according to theRobert Mason equation at the level of significance 0.05, so the sample size was 162 respondents,i.e. a percentage 58% collected the necessary data using a questionnaire prepared as a basic toolfor data collection consisting of 20 items distributed on two axes ,and the results of the researchwere analyzed and presented using the spss statistical program, as well as manual analysis usingrepetitions, the weighted mean, the standard deviation, and the percentage weight. And the
... Show MoreBackground: The present study was carried out to compare shear bond strength of sapphire bracket bonded to zirconium surface after using different methods of surface conditioning and assessment of the adhesive remnant index. Materials and methods: The sample composed of 40 zirconium specimens divided into four groups; the first group was the control, the second group was conditioned by sandblast with aluminum oxide particle 50 μm, the third and fourth group was treated by (Nd: YAG) laser (1064nm)(0.888 Watt for 5 seconds) for the 1st laser group and (0.444 Watt for 10 seconds) for the 2nd laser group. All samples were coated by z-prime plus primer. A central incisor sapphire bracket was bonded to all samples with light cure adhesive res
... Show MoreThis research aims to measure the discrepancy between the accounting income which is prepared according to generally accepted accounting principles and the tax income that is being prepared according to the rules and tax laws, and find out the most important differences that arise between incomes.The research found the most important to the following conclusions:1.Faces determining the tax base for companies subject to income challenges related to the weakness of the efficiency and the possibility of technical angel tax and its ability to examine the financial statements submitted to the tax administration tax.2.That the tax system in Iraq does not comply with accepted accounting principles generally accepted.The research recommends the
... Show MoreThe research aims to identify the most important difficulties facing the scientific research in the technical university in the financial, organizational and administrative according to the quality standards according to the paragraphs studied in the questionnaire questionnaire prepared for this purpose, including the research community on the Central Technical University, which includes several technical colleges and technical institutes were selected A sample of the researchers in the Institute of Technical Management where the number of training was 78 teachers took a random sample of researchers amounted to 40% of the questionnaire, and after the collection and classification of data were used statistical means, including the mean ar
... Show MorePrograms and performance budget represents a sophisticated method of public budget numbers, which includes all allocations to be determined for each job or activity within a government entity, which is analyzed according to their needs and costs, and this method can be applied using one of the cost accounting techniques, which is the technique of analyzing the value chain that reduces costs by avoiding activities that do not add value and enhance activities that add value to the economic entity, the current research aims to develop the budget system in government entity by using the budget of programs and performance as a tool for planning and monitoring events and activities, thereby reducing the waste of public money by reducing unnecessa
... Show MoreWhen the guard honey bees, Apis mellifera L., form a clump at the hive entrance or on the flight board, the oriental hornet, Vespa orientails L., either creeps toward the clump or hovers over it in order to take a bee. Once the hornet creeps, only few bees facing the hornet become alert, rock their heads and antennae, open their wings, and take a posture of defense. The rest of the clump stays listless without any signal of concern. However, the clump stays dense and the defending bees do not detach themselves neither from the rest of the clump nor from each other. For this reason, it is very difficult for the hornet to grab a bee unless the latter makes a “mistake” by detaching herself from other adjacent bees. If the hornet grabs s
... Show More