The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publications? It also determined the importance of research in the theoretical and applied aspects. The goal of the research was determined to reveal graphic privacy in the design of vector graphics. It also identified three limits for research regarding the subject, time and place, as well as defining the terms of privacy and graphic privacy and vector graphics. The second chapter also included the theoretical framework related to the knowledge of the subject of the research, and the theoretical framework included analysis and criticism of models of children's publications, then the research came out with results from them. The dominant unit appeared in computer vector graphics through vector graphic processors, and thus excitement and strangeness were achieved. The research also came out with recommendations for the current study. Then the research was included in the list of Arab and foreign sources related to the research
This paper concerns with the state and proof the existence and uniqueness theorem of triple state vector solution (TSVS) for the triple nonlinear parabolic partial differential equations (TNPPDEs) ,and triple state vector equations (TSVEs), under suitable assumptions. when the continuous classical triple control vector (CCTCV) is given by using the method of Galerkin (MGA). The existence theorem of a continuous classical optimal triple control vector (CCTOCV) for the continuous classical optimal control governing by the TNPPDEs under suitable conditions is proved.
Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreAn indirectly method is used to determine hydrogen peroxide. The method based on oxidation of chromium (III) ion by hydrogen peroxide in basic medium to form chromate ion which react with barium (II) ion to produce a yellow precipitate (BaCrO4). Under the optimum established conditions, the linear range of 0.50-25.00 mmol L-1 along with correlation coefficient (r) of 0.9992, Limit of detection (LOD) 0.68 μg / 100 μL, precision expressed as relative standard deviation for six replication measurements at 5.0 mmol.L-1 H2O2 of less than 2% were obtained for hydrogen peroxide. The developed method was successfully applied for the estimation of H2O2 in three pharmaceuticals preparation of different companies using continuous flow injection o
... Show MoreSuperconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
The existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreLet A ⊆ V(H) of any graph H, every node w of H be labeled using a set of numbers; , where d(w,v) denotes the distance between node w and the node v in H, known as its open A-distance pattern. A graph H is known as the open distance-pattern uniform (odpu)-graph, if there is a nonempty subset A ⊆V(H) together with is the same for all . Here is known as the open distance pattern uniform (odpu-) labeling of the graph H and A is known as an odpu-set of H. The minimum cardinality of vertices in any odpu-set of H, if it exists, will be known as the odpu-number of the graph H. This article gives a characterization of maximal outerplanar-odpu graphs. Also, it establishes that the possible odpu-number of an odpu-maximal outerplanar graph i
... Show MoreThe research explain the developments in the structure of government Expenditure for the period (1990-2014), this period include tow different periods in terms of the conditions, the first period (1990-2002)characterized by imposing the economic sanctions and deny the Iraqi economy from the oil revenues, while the second period (2003-2014) marked by abundance resource rents as a result of lifting the ban on oil exports, (autoregressive Distributed lag Model) has been used to measure the impact of government Expenditure in both side current and investment in the oil-GDP (gross domestic product) and non oil-GDP, the stady found that there is no significant relationship between current Expenditure in non-oil and oil-GDP in bo
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreRecurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show More