This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreThis research aims to study the radiation concentration distribution of the old District of Najaf (Iraq), where 15 samples were taken from featured sites in the District, which represents archaeological, religious, and heritage sites. Track detector CR-39 was used to calculate the concentration of three different soil weights for each sample site after being exposed for a month. Geographical information systems (GIS) were used to distribute the radioactive concentration on the sites of the samples, where two interpolation methods, namely the inverse distance weight method (IDW) and the triangle irregular network method (NIT), to study the distribution of the radioactivity concentration. The study showed that the western part of the district
... Show MoreQJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4
<p>There is an Increasing demand for the education in the field of E-learning specially the higher education, and to keep contiuity between the user and the course director in any place and time. This research presents a proposed and simulation multimedia network design for distance learning utilizing ATM technique. The propsed framework determines the principle of ATM technology and shows how multimedia can be integrated within E- learning conteext. The first part of this research presents a theoretical design for the Electricity Department, university of technology. The purpose is to illustrate the usage of the ATM and Multimedia in distance learning process. In addition, this research composes two entities: Software entity
... Show MoreDBN Rashid, IMPAT: International Journal of Research in Humanities, Arts, and Literature, 2016 - Cited by 5
The characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More