Object Detection and Distance Measurement Using AI
...Show More Authors
The issue of measurement of operational efficiency and productivity plays a major role in determining the weakness of the company, especially in relation to the productive processes, and thus starting to address these points and improve their performance. Hence the problem of research on how to determine the constraints in the production process, to identify weaknesses in the company. The research aims to clarify the role of throughput accounting in measuring the operational efficiency of the company in addition to clarify some of the constraints and causes behind them. The study concluded a set of conclusions, the most important of which is the availability of throughput accounting indicators that help in measuring operational efficienc
... Show MoreBackground: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study aimed to investigate the prevalence of intestinal helminth infections in humans and detect Toxocara spp. in cats, with a focus on assessing the impact of age and gender on infection rates. Traditional diagnostic methods have historically limited the accurate identification of helminth infections in humans. Analysis of 450 human stool samples revealed an overall helminth infection rate of 5.7% using conventional techniques. The specific infection rates were 0.4% for Strongyloides stercoralis, 0.6% for Schistosoma mansoni, 1.7% for Hymenolepis nana, and 2.8% for Ascaris lumbricoides. Notably, no infections were recorded in the 30–39 and ≥40-year age groups, while the highest infection rate (16.3%, P≤0.01) was observed in indi
... Show MoreEnterococcus faecalis is a natural inhabitant of the human gastrointestinal tract but can become dominant and cause infections when the intestinal homeostasis is disrupted. Enterococcal bacteria are considered one of the main reasons for the failure of endodontic treatment. This study aim to isolation and identification of E.faecalis depended on phenotype and molecular method, the phenotypic patterns using traditional biochemical methods, and then diagnosed it based on the genotypes and using specialized primers for 16srRNA and D-Ala: D-Ala ligase genes using polymerase chain reaction, In order to achieve successful treatment, it is necessary to study the bacterial behavior within the root canal system together with their resistance and def
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show More