Preferred Language
Articles
/
ijs-6066
Iris Outer Boundary Localization Based on Leading Edge Technique
...Show More Authors

In recent years, the iris biometric occupies a wide interesting when talking about
biometric based systems, because it is one of the most accurate biometrics to prove
users identities, thus it is providing high security for concerned systems. This
research article is showing up an efficient method to detect the outer boundary of
the iris, using a new form of leading edge detection technique. This technique is
very useful to isolate two regions that have convergent intensity levels in gray scale
images, which represents the main issue of iris isolation, because it is difficult to
find the border that can separate between the lighter gray background (sclera) and
light gray foreground (iris texture). The proposed method tried to find iris radius by
seeking in the two iris halves (right and left) circularly, in term of certain angles
interval for each half, to avoid the existence of the upper and lower eyelids and
eyelashes. After the two radiuses (i.e. for each half) had been determined, the iris
final iris radius would be evaluated to the minimum value of them. This method
tested on all samples of CASIAv4-Interval dataset, which consist of 2639 samples,
captured from 249 individuals, and distributed on 395 classes, the accuracy of the
testing was 100% for outer boundary detection.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Studying Hueckel edge detector using binary step edge image
...Show More Authors

Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
The rule of leading the boy in prayer
...Show More Authors

God Almighty has imposed on us obligations and set limits on us, and among these obligations is the prayer, which is considered a pillar of Islam. And recently on the statement of its importance, and through extensive explanations, they elaborated on the statement of its pillars, its obligations, its Sunnahs, its rituals, and its bodies, and it is known that the imam in prayer is an important part of the parts of prayer. Whoever assumes this responsibility must be aware of these conditions, the most important of which is jurisprudence in religion, and there has been a disagreement between the jurists, especially the owners of the four schools of thought, about who is qualified to lead the imamate, and this is within many and wide details

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Psychological and Social Reasons Leading to Juveniles Delinquency: Psychological and Social Reasons Leading to Juveniles Delinquency
...Show More Authors

Abstract
Disturbs the social system in any society specially in Iraq other than
other Islamic and Arabic countries. That is according to the abnormal
conditions that Iraq has past through as wars and blockage, and lastly the
invasion. Therefore it has been necessary to put this phenomenon under
study and analysis to discover Juvenile Delinquency is one of the most
prominent social phenomenon that the important reasons behind it, and trying
to treat what can be treated of the effects of it upon society.
This study is mainly concerned with the explaining the social factors
leading toward juvenile delinquency trying to crystallize the problem of the
study in the following question: (What are the psychological,

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Solution of Nonlinear Singular Boundary Value Problem
...Show More Authors

    This paper is devoted to the analysis of nonlinear singular boundary value problems for ordinary differential equations with a singularity of the different kind. We propose semi - analytic technique using two point osculatory interpolation to construct polynomial solution, and discussion behavior of the solution in the neighborhood of the singular points and its numerical approximation. Two examples are presented to demonstrate the applicability and efficiency of the methods. Finally, we discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems.

View Publication Preview PDF
Publication Date
Sat Oct 03 2009
Journal Name
Proceeding Of 3rd Scientific Conference Of The College Of Science
Research Address: New Multispectral Image Classification Methods Based on Scatterplot Technique
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Self-Repairing Technique Based on Microcapsules for Cementitious Composites- A Review
...Show More Authors

Self-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durab

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus Crossref