In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detection and missed detections (like in a sudden change of light in the scene). The software part is written in Matlab language as an M-file and using the Simulink library, the hardware part we used a Pentium 4 computer with a web camera or a laptop integrated camera.
Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreThe aim of the current research was to evaluate the content of the computer textbook for second grade intermediate in Iraq in accordance with the technological literacy and submitting developmental suggestions, the researchers adopted the descriptive and analytical approach. The researchers used as a population and sample of her research are the content of the computer textbook for second grade intermediate. In order to prepare the first draft of the research tool that content the five technological literacy fields (The Nature of Technology, Technology and Society, Design, Abilities of Technological World, The Designed World). The researchers distributed the first draft tool among some experts and gave them enough time to check each item
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreImage processing applications are currently spreading rapidly in industrial agriculture. The process of sorting agricultural fruits according to their color comes first among many studies conducted in industrial agriculture. Therefore, it is necessary to conduct a study by developing an agricultural crop separator with a low economic cost, however automatically works to increase the effectiveness and efficiency in sorting agricultural crops. In this study, colored pepper fruits were sorted using a Pixy2 camera on the basis of algorithm image analysis, and by using a TCS3200 color sensor on the basis of analyzing the outer surface of the pepper fruits, thus This separation process is done by specifying the pepper according to the color of it
... Show MoreThe current research contains four chapters. The first topic included the methodological framework that included the problem of research and the need for it, and then the importance of the research, and then the aim of the research, its limits and the definition of terms linguistically, conventionally and procedurally. The second chapter (the theoretical framework) contained two topics, the topic The first is titled: The Outward Vision in Child Theater Performances, while the second topic was titled: Presentation Technology in Child Theater, Chapter Four (Research Procedures), which organized the research community and analyzed its sample, and the fourth chapter contained research results, conclusions and recommendations. The prop
... Show MoreFor several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
Tax revenues are considered one of the important sources of public revenues for the state as one of the tributaries that finance the public treasury to implement development plans. Real estate taxes are one of the sources of obtaining tax revenues in the state, as it follows that there are a number of factors that affect these revenues, which requires the development of necessary solutions and recommendations to address the resulting effects. Accordingly, this research sheds light on tax revenues in general and real estate tax revenues in particular to indicate the extent of their contribution to the total tax proceeds, as the tax proceeds of the real estate tax were analyzed into the total tax proceeds for the years (2017-2021). A numbe
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
The interaction between comet Hale-Bopp tail with the solar wind is investigated in the present paper using magneto-hydrodynamic (MHD) numerical simulation, which accounts for the presence of the interplanetary magnetic field (IMF). The simulation is based on three-dimensional Lax-Wendroff explicit scheme, providing second-order accuracy in space and time. The ions produced from the nucleus of the comet will add considerable effects on the microstructure of the solar wind, thus severely altering its physical properties. The present simulation focuses on careful analysis of these properties by means of simulating the behavior of the comet Hale-Bopp’s tail at 1 AU from the sun. These properties include the changes of the plasma density,
... Show More