AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreThis paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance
... Show MoreWe propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreBackground:The document on hypertension in the elderly promoted by the American college of cardiology and the American heart association (ACCF/AHA) was written with the intent to be a complete reference at the time of publication on the topic of managing hypertension in the elderly. More recently, the European society of hypertension (ESH) and the European society of cardiology (ESC) issued the 2013 ESH/ESC Guidelines for the management of arterial hypertension, followed by The 2014 Canadian Hypertension Education Program (CHPE), and the Eighth Report of the Joint National Committee (JNC8), all of which has endorsed specific recommendations for the management of elderly hypertensive patients.
هذا البحث يتحدى الافتراض القائل أن العراق بعد عام 2003 يجب دراسته بمعزل عن ديناميات التي سبقت عام 2003، اذ تبرهن هذه الدراسة على ان الشعبوية هي احدى الديناميات التي تمظهرت بصورة شعبوية استبدادية في النظام الديكتاتوري، نظرًا لأنه كان زعيم حزب علماني وعربي على نطاق واسع، لكنه استخدم الدين والقومية بشكل استراتيجي وانتقائي في ظروف معينة، مما خلق سياق الشعبوية الحديثة. الموجة الثانية هي الشعبوية العرقية والطائف
... Show MoreThe research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the
... Show MoreApical meristems, lateral buds, anthers of immature flowers and immature embryos of chickpea ( Cicer arietinum L.) were cultured on MS media with different growth regulators and incubated for 6 weeks at 25-27?C with 16 hrs photoperiod for callus initiation. Results indicated that 1 and 0.1 mg/l of 2,4-D and BA were suitable for callus initiation when apical meristems and lateral buds were used. While 2 and 0.5 mg/l of both growth regulators were essential for immature embryos. It was noticed that using chickpea anthers of the MS medium must contain 1mg/l 2ip and 0.5 mg/l IAA. However, MS medium supplemented with 1-3 mg/l of BA and 2,4-D respectively was good for callus initiation from lateral buds, anther and immature embryos.
... Show More