Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, which allow fast action by the administrator to fix such tampering. The results show that selecting of threshold equal to two was fair in detecting motion and value of five, in case of changing the camera direction through testing of fast and slow motions.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThe research Was based to on a real problem and realistically of represented by that Iraqi Airways company does not have the electronic cost accounting system and therefore be the process of the pricing various services provided by a company sample research respecting air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t
... Show MoreThe problem of the study was to identify the possibility of benefiting from the application of the target cost system as a modern cost system to activate the environmental cost management instead of the traditional systems used in the company due to the great transformations witnessed by the business environment in all fields, which have resulted in the search for modern systems to provide more accurate and more appropriate information to reduce Costs, because accurate information makes the company have a complete vision to achieve the company’s goals. To solve this problem, the research was based on the following hypothesis (that the role of the target cost system leads to the activation of environmental cost management). Target c
... Show MoreObjective. This study aimed to evaluate the orthodontic bond strength and enamel-preserving ability of a hydroxyapatite nanoparticles-containingself-etch system following exposure to various ageing methods. Materials and Methods. Hydroxyapatite nanoparticles (nHAp) were incorporated into an orthodontic self-etch primer (SEP, Transbond™ plus) in three different concentrations (5%, 7%, and 9% wt) and tested versus the plain SEP (control) for shear bond strength (SBS), adhesive remnant index (ARI) scores, and enamel damage in range-finding experiments using premolar teeth. The best-performing formulation was further exposed to the following four artificial ageing methods: initial debonding, 24 h water storage, one-month water stora
... Show MoreBackground: Several infectious lung diseases often develop in patients with Rheumatoid arthritis (RA), especially during immunosuppressive medication, including disease-modifying anti-rheumatic drugs (DMARDs). The present study aimed to determine the role of respiratory tract bacterial infection in RA activity. Methods: Blood and sputum samples were collected from 31 patients with RA and 12 healthy subjects as control. The bacterial isolates were isolated and identified in collected sputum by biochemical tests and Vitec 2 system. Results: In the present study, thirty-one patients with RA were compared with 12 healthy subjects. Eight patients with RA were not infected with pathogenic bacteria (RA-NIPB) (25.8%). Twenty-three RA patients wer
... Show MoreThe Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show More