Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance of the system is better based on
the recognition rate measurement.
This work was conducted to study the extraction of eucalyptus oil from natural plants (Eucalyptus camadulensis leaves) by organic solvents. the effects of the main operating parameters were studied; type of solvent (n-hexane and ethanol), time to reach equilibrium, the temperature (45°C to 65°C) for n-hexane and (45°C to 75°C) for ethanol, solvent to solid ratio (5:1 to 8:1 (v/w)), agitation speed (0 to 900 rpm) and the particle size (0.5 to 2.5 cm) of fresh leaves to find the best processing conditions for the achieving maximum oil yield. The concentration of eucalyptus oil in solvent was measured by using UV-spectrophotometer. The results (for n-hexane) showed that the agitation speed of 900 rpm, temperature 65°C with solvent to soli
... Show MoreZM Al-Bahrani, Medico Legal Update, 2021
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
Twenty isolates of Serratia marcescens were isolated from inflammation of the urinary tract (UTI)., These isolates were found to produce hemolysin as indicated by blood agar plates in which the hemolysis of red blood cell indicate a positive result. Isolates were selected according to their hemolysis activity by measuring absorbance of hemoglobin at 405 nm that released from red blood cell. Hemolysin was completely purified using 50-75% saturation of ammonium sulphate followed by ion exchange chromatography with DEAE-cellulose then gel filtration chromatography by sepharose 4B. Accordingly molecular weight for the purified toxin was estimated as 45 KD.
Resource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in
... Show Morehis study aims to determine most stable isobar from some isobaric elements with mass number (A= 50-65 & 180-195). This aim achieved by, firstly: plot mass parabolas for these isobaric family, second: calculated the atomic number for most stable isobar (ZA) value. To plot the mass parabola, the binding energy (B.E) calculated from semi empirical formula for these isobars. The mass number (A) plotted as a function to the (ZA) for each range; we get a linear relationship between them. An empirical formula for the most stable isobar has been developed from this linear dependence. From the results, we can see that mass parabolas for isobaric elements with odd mass number (A) are different from the mass parabolas of even mass number (A) isobars,
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More