Deep learning techniques are used across a wide range of fields for several applications. In recent years, deep learning-based object detection from aerial or terrestrial photos has gained popularity as a study topic. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles andclassification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing items in images.This article, will be focusing on comparing the main differences among the YOLO version's Architecture, and will discuss its evolution from YOLO to YOLOv8, its network architecture, newfeatures, and applications. Itstarts by looking at the basic ideas and design of the first YOLO model, which laid the groundwork for the following improvements in the YOLO family. In additionally, this article will provide a step-by-step guide on how to use the YOLO version architecture, Understanding the primary drivers, feature development, constraints, and even relationships for the versions is crucial as the YOLO versions advance.Researchers interested in object detection, especially beginning researchers, would find this paper useful and enlightening
The research aims to show the relationship between artificial intelligence in accounting education and its role in achieving sustainable development goals in the Kingdom of Bahrain. The research dealt with the role of artificial intelligence applications in accounting education at the University of Applied Sciences as a model for Bahraini universities to achieve sustainable development goals. The application of artificial intelligence in accounting education achieves seven of the seventeen sustainable development goals. It also concludes that there is an artificial intelligence infrastructure in the Kingdom of Bahrain, as it occupies a leading regional position in digital transformation, as Bahrain ranks first in the Arab world i
... Show MoreHuman beings are starting to benefit from the technology revolution that witness in our time. Where most researchers are trying to apply modern sciences in different areas of life to catch up on the benefits of these technologies. The field of artificial intelligence is one of the sciences that simulate the human mind, and its applications have invaded human life. The sports field is one of the areas that artificial intelligence has been introduced. In this paper, artificial intelligence technology Fast-DTW (Fast-Dynamic Time Warping) algorithm was used to assess the skill performance of some karate skills. The results were shown that the percentage of improvement in the skill performance of Mai Geri is 100%.
ABSTRACT
Learning vocabulary is a challenging task for female English as a foreign language (EFL) students. Thus, improving students’ knowledge of vocabulary is critical if they are to make progress in learning a new language. The current study aimed at exploring the vocabulary learning strategies used by EFL students at Northern Border University (NBU). It also aimed to identify the mechanisms applied by EFL students at NBU University to learn vocabulary. It also aimed at evaluating the approaches adopted by EFL female students at Northern Border University (NBU) to learn a language. The study adopted the descriptive-analytical method. Two research instruments were developed to collect data namely, a survey qu
... Show More<p>There is an Increasing demand for the education in the field of E-learning specially the higher education, and to keep contiuity between the user and the course director in any place and time. This research presents a proposed and simulation multimedia network design for distance learning utilizing ATM technique. The propsed framework determines the principle of ATM technology and shows how multimedia can be integrated within E- learning conteext. The first part of this research presents a theoretical design for the Electricity Department, university of technology. The purpose is to illustrate the usage of the ATM and Multimedia in distance learning process. In addition, this research composes two entities: Software entity
... Show MoreThe experimental proton resonance data for the reaction P+48Ti have been used to calculate and evaluate the level density by employed the Gaussian Orthogonal Ensemble, GOE version of RMT, Constant Temperature, CT and Back Shifted Fermi Gas, BSFG models at certain spin-parity and at different proton energies. The results of GOE model are found in agreement with other, while the level density calculated using the BSFG Model showed less values with spin dependence more than parity, due the limitation in the parameters (level density parameter, a, Energy shift parameter, E1and spin cut off parameter, σc). Also, in the CT Model the level density results depend mainly on two parameters (T and ground state back shift energy, E0), which are app
... Show MoreThe evolution in the field of Artificial Intelligent (AI) with its training algorithms make AI very important in different aspect of the life. The prediction problem of behavior of dynamical control system is one of the most important issue that the AI can be employed to solve it. In this paper, a Convolutional Multi-Spike Neural Network (CMSNN) is proposed as smart system to predict the response of nonlinear dynamical systems. The proposed structure mixed the advantages of Convolutional Neural Network (CNN) with Multi -Spike Neural Network (MSNN) to generate the smart structure. The CMSNN has the capability of training weights based on a proposed training algorithm. The simulation results demonstrated that the proposed
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn