In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.
In contemporary discourses the debate of most Western thinkers is about the efforts to clarify the normative foundations of democracy. And then, some political thinkers have adopted other models differ in terms of standards for traditional liberal democracy. Be the common goal of democracy will give the formation of a greater role than usual in political liberalism rather than limiting the participatory activity of citizens on the function to give permanent legitimacy to the exercise of state authority. The activity is to be permanently enshrined in the democratic public sphere and the issue must be understood as the source of all political decisions.
The pioneer contributions included a sign for Iraqi Bryoflora were those of (Juratzka &
Milde) and Schiffner published at the end of the 19th century i.e. (1870 & 1897) respectively.
However, throughout the whole next century, the 20th, only few papers, by different authors,
have been published separately. They are Schiffner (1913); Handel-Mazzetti (1914); Froelich
(1959); Vondracek (1962 & 1965); Agnew &Townsend (1970); Agnew ( 1973 ) ; Agnew&
Vondracek (1975); Long (1979); Al-Ni’ma (1994). The most comprehensive work among
them was the “Moss Flora of Iraq” by Agnew & Vondracek (1975). It included a description
of 54 genera and 145 species with an identification key in addition to notes
Diyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed t
... Show Moreنشاطات فرع الدراسات الدولية
The energy level scheme of 188Os has been established on the basis of
y-y coincidence measurements. Ge (Li) and HPGe detectors were
employed to study the gamma spectra produced in the -decay of 188Re to
188Os. Fourteen new transitions and four new levels at 1660, 1871, 1948
188and 2034 keV are suggested. Relative intensities from singles
measurements, branching ratios and loft values were calculated and
multipolarities, spins and parities deduced
A seismicity study of khanaqin city and surrounding area is carried out. More than 270
quakes between 22 Nov. to 30 Dec. 2013 are recorded by Iraqi Seismic Network (ISN).
Analyses of these events show earthquakes magnitude range between (1.2 – 5.6) degree,
focal depth between (4 – 27) km. Seismotectonic map for studied area is drawn .
Isointensity maps for the felt earthquakes are drawn and show the intensity range
between (I-VII) according to the modified Mercalli scale. Fault plane solutions for four
events in the study area indicate a reverse strike slip solution along planes with NW –SE
direction
Background:
Scientific Activities College of branches
Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es
In the event of a crime, a right to society arises in the imposition of the penalty by the perpetrator of the crime, through the criminal case, as it is the only way to do so. The acts carried out by the parties to the criminal proceedings, whether they are the litigants or others, are referred to as procedural actions. Directly any procedural action given only the availability of conditions
these conditions on the two communities: the first objective and the second formality, may relate to those conditions that the person who initiates the procedural or procedural work itself and can not work procedural to produce its impact if one of his conditions. The importance of these conditions of the importance of the rules of criminal p
... Show More