Facial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calculation for each image in (MIT, FERET) dataset and the adaboost algorithm is implemented to collect the weak classifiers and produce strong classifier. By using classifier cascade process, the speed and accuracy of face detection system is increased .The proposed method has accuracy is about 98.97% for detection faces.
Background: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the oper
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreThe aim of the current study is to create special norms of the second edition of Minnesota multi faces personality inventory, and the fifth edition of the sixteen personality factor questionnaire of catel. To this end, the researcher applied the Minnesota multi faces personality inventory over a sample of (1646) secondary and university students as well as plenty of disorders. She also applied the sixteen personality factor questionnaire of catel on (4700) secondary and university students. SPSS tools were used to process data.
In this article an attempt has been made to procure the concept of pairwise neutrosophic simply open set, pairwise neutrosophic simply continuous mapping, pairwise neutrosophic simply open mapping, pairwise neutrosophic simply compactness, pairwise neutrosophic simply b-open set, pairwise neutrosophic simply b-continuous mapping, pairwise neutrosophic simply b-open mapping and pairwise neutrosophic simply b-compactness via neutrosophic bi-topological spaces (in short NBTS). Besides, we furnish few illustrative examples on them via NBTS. Further, we investigate some basic properties of them, and formulate several results on NBTSs.
This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreThis Action research aimed at Assisting Students of Faculty of Educational Sciences at Al-Quds Open University to design computerized lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date , the researchers used focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t
... Show MoreIn order to increase the amount of solar radiation reaching a solar panel, and hence increase its performance, a tracking system might be used. A prototype of an efficient and portable solar tracking system, for home applications was constructed. The Arduino Uno Microcontroller is utilized to drive the proposed tacking system. The results of area under curve show that at certain circumstances, the open-loop tracking system is more efficient as compared with fixed one, while the closed-loop tracker is slightly efficient than open-loop tracker.
In this paper, we shall introduce a new kind of Perfect (or proper) Mappings, namely ω-Perfect Mappings, which are strictly weaker than perfect mappings. And the following are the main results: (a) Let f : X→Y be ω-perfect mapping of a space X onto a space Y, then X is compact (Lindeloff), if Y is so. (b) Let f : X→Y be ω-perfect mapping of a regular space X onto a space Y. then X is paracompact (strongly paracompact), if Y is so paracompact (strongly paracompact). (c) Let X be a compact space and Y be a p*-space then the projection p : X×Y→Y is a ω-perfect mapping. Hence, X×Y is compact (paracompact, strongly paracompact) if and only if Y is so.
The Accommodation industry in Iraq suffers from many problems, especially after 2003, when the Accommodation industry was exposed to many crises due to the security and political situation in Iraq, which negatively affected the administrative operations inside the industry and created many problems, the most important of which are deterioration, high costs and poor performance, so some hotel administrations sought To find alternative solutions that help in the advancement of hotels, one of the proposals is to go to technology, as technology is currently one of the most important solutions to solve large complex problems, as the world has turned to automation to solve complex problems such as increasing production, reducing costs, and rai
... Show More