User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
ABSTRACT: Pathogenic bacteria responsible for the causation of many common diseases have been identified on currency notes. The present investigation was carried out on one hundred currency notes of all the denominations (50, 100, 250, 500 and 1000RY), obtained from different occupational mainly bus drivers, hawker street, vegetable vendor, restaurants and butchers and fish seller groups in Taiz city,Yemen. Identification and characterization revealed active participation of the following species of organisms in the ascending order of percentage as E. coli(50.28 %),Staphylococci aureus(14.04 %), Klebsiellaspp(4.39 %),proteus(4.39 %), salmonella(1.25 %), shigella(0.72 %), Coagulase negative staphylococcus(0.60 %), pseudomonas(0.50 %),
... Show MoreThe production of polyhydroxyalkanoates PHAs from biopolymer degrading bacteria was examined
The most important features that we have reached through this study, are shown the cross-section of root were in the secondary growth stage and the epidermis of leaf were studded by stomata complex, the type of it was anomocytic that’s mean no have subsidiary cells around the guard cells, the mesophyll bifacial also the midrib region of leaf like the pear and the vascular bundle located in the center crescent in shape. The cross-sections of petiole ovate shape with two ears in the lateral side and the vascular bundles crescent in shape. The cross-section of fruits circular component of three-layer the outer layer pericarp, mesocarp, and the endocarp, surrounding the ovary or the see
Many diseases can produce cardiac overload, of these disease hypertension, valve disease congenital anomaly in addition to many other disease. One of the most common diseases causing left ventricle overload is hypertension. A long term hypertension can cause myocardium hypertrophy leading to changes in the cardiac contractility and reduced efficiency. The investigations were carried out using conventional echocardiography techniques in addition to the tissue Doppler imaging (TDI) from which many noninvasive measurements can be readily obtained. The study has involved the effect of hypertension on the myocardium stiffness index through the measurement of early diastolic filling (E) and the early velocity of lateral mitral annulus (E
... Show MoreCare and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.
We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreWrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom
... Show MoreThe objective of the research is to identify the level of supervisory performance of the educational supervisor from the point of view of headmasters at secondary schools. The problem was the need to evaluate performance. A sample of (97) school headmasters was chosen to collect the needed data, they proportionated (38%) of the total community. the researcher designed a questionnaire consisted of (43) paragraphs with five areas. The results showed that there is a good level of performance among supervisors; there are no significant differences in the variable of the certificate, while there were significant differences in terms of gender for the benefit of males. The research concluded with a number of recommendations and suggestions.
... Show MoreThis study is about awareness of teaching explanation difficulties in the Islamic university from the lecturers point of view. It discussed the difficulties and the traditional teaching methods of explanation. The study concentrated on teaching Islamic studies in general and teaching explanation in specific and set difficulties so as to be treated.
The study is of three chapters, the first contains the difficulties in several aspects like the educational goals, text contents, teaching methods and styles, students, educational techniques, educational aids and evaluation, it addition to the lecturers of Islamic university colleges in 2009-2
... Show More