The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ web-based application to enhance attendance management. The hardware encompasses the integration of an ESP8266 NodeMCU and the biometric AS608 fingerprint sensor interfaced with the database for which the front-end and back-end integration was through the React framework. The system uses a web application that displays the attendance results and scheduled course data from its database, provides feedback to lecturers on which student missed classes and calculates a student’s average attendance for the semester. By implementing this system, the accuracy of student attendance is expected to experience an appreciable improvement, eliminate proxy signing, provide a more secure alternative for attendance recording, curtail tardiness to classes, and ultimately improve student productivity on execution.
Recently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment
... Show MoreIntelligent systems can be used to build systems that simulate human behavior. One such system is lip reading. Hence, lip reading is considered one of the hardest problems in image analysis, and thus machine learning is used to solve this problem, which achieves remarkable results, especially when using a deep neural network, in which it dives deeply into the texture of any input. Microlearning is the new trend in E-learning. It is based on small pieces of information to make the learning process easier and more productive. In this paper, a proposed system for multi-layer lip reading is presented. The proposed system is based on micro content (letters) to achieve the lip reading process using deep learning and auto-correction mo
... Show MoreTo finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o
... Show MoreIn this paper, the effects of prey’s fear on the dynamics of the prey, predator, and scavenger system incorporating a prey refuge with the linear type of functional response were studied theoretically as well as numerically approach. The local and global stabilities of all possible equilibrium points are investigated. The persistence conditions of the model are established. the local bifurcation analysis around the equilibrium points, as well as the Hopf bifurcation near the positive equilibrium point, are discussed and analyzed. Finally, numerical simulations are carried out, and the obtained trajectories are drowned using the application of Matlab version (6) to explain our found analytical
... Show MoreCandida ssp are of medical importance because they are the most common opportunistic mycosis worldwide, a common cause of nosocomial urinary tract infections (UTIs), oral candidiasis and genitourinary candidiasis. The development of Candida spp infection depends on several factors such as age, sex, and immunity of the host-pathogen relationship. They are resistance to one or more antifungal. The purpose of these studies to isolation and identification of Candida spp from urine sample and investigation of susceptibility of these strains to Amphotericin B andFluconazole. There are 105 Urine sample of the renal failure were collected using a sterile urinary cap, different diagnostic
... Show MoreThe current study focuses on the bacterium Acinetobacter baumannii due to its importance as a nosocomial infections source in addition to its increased resistance against antibiotics. Different clinical and hospital environment samples were collected, and cultured on A. baumannii selective media: Leed Acinetobacter agar and Herellea agar. A. baumannii have been identified by traditional methods, followed by confirmation using molecular identification to detect blaoxa-51 like gene which is considered a diagnostic gene since it is present in genome of all A. baumannii strains. The result was, nineteen bacterial isolates of A.baumannii were obtained, from twenty-seven suspected isolate
... Show MoreCurrently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu
The Mishrif Formation (Cenomanian – Early Turonian) is an important geologic formation in southern Iraq due to its petrophysical properties and geographic extensions, making it a good reservoir of hydrocarbons. Petrophysical properties of the Mishrif Formation in the current study at the Nasiriya oil field were determined from the interpretation of three open-hole logs data of (NS-1, NS-2, and NS-3) wells.
The results of the Mishrif petrophysical evaluation showed that the formation consists of five variable units (CRI, MA, CRII, MB1 and MB2), each one characterized by distinct petrophysical characteristics.
The upper (MA) and lower (MB) units were determined using electrical, porosity and gamma-ray logs. A sha
... Show MoreThere is a relationship between the sizes of urban centers and regional
development, concerning the role that these centers are playing in
developmental process.
The research assume that the urban system in the governorate, has
been affected by the external environment due to the religious dominance of
Kerbla city.
The research is composed of three sections, the first is a theoretical
background, which focus upon the general directions of the models and
theories that have a relationship with the subject. The second is a practical
part aims at determination the characteristics of the sizes of the cities in the
governorate. Depending upon of previous part, i.e., the practical part section three deals with
Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show More