This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
AO Dr. Ali Jihad, Journal of Physical Education, 2021
The Accommodation industry in Iraq suffers from many problems, especially after 2003, when the Accommodation industry was exposed to many crises due to the security and political situation in Iraq, which negatively affected the administrative operations inside the industry and created many problems, the most important of which are deterioration, high costs and poor performance, so some hotel administrations sought To find alternative solutions that help in the advancement of hotels, one of the proposals is to go to technology, as technology is currently one of the most important solutions to solve large complex problems, as the world has turned to automation to solve complex problems such as increasing production, reducing costs, and rai
... Show MoreThe problem of present study is determined by answering the following questions:
1) What is the effect of using the oral open- ended questions on Students' achievement in the third-stage of Arabic department in the college of Education? 2) What is the effect of the oral open-ended questions on developing the creative thinking of students in
... Show MoreBackground: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me
... Show MoreThis study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for th
... Show MoreSupport vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca
... Show MoreOne of the most enduring expressions of urban poverty in developing countries is the proliferation of slums and informal settlements .these settlements have the most deplorable living and environmental conditions within the city and are characterized by inadequate water supply, squalid conditions of environmental sanitation .overcrowded and dilapidated habitation, hazardous location .insecure tenure and vulnerability to serious health risks among many others .its in recognition of the of the development challenges to significantly improve the lives of at least 800000 people allover the country So our objectives in this research are the ensuring of a durable improvement of housing conditions and housing environment of poor people
... Show Morehe planning process is generally aimed at developing the city and making it meet the needs of different citizens. The green areas constitute one of the basic needs of the city and with the rapid and unusual growth in the size of cities, especially in the third world countries, which is often embodied in capitals. Which was achieved as a result of many reasons, including political, economic and social and even enshrined through some of the decisions that were issued and the city of Baghdad, but a clear example of these cities. The city and the environment are inseparable terms. The city is where people spend their lives and their daily experiences, and the environment is the center in w
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More