The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities to analyze, detect and track objects plus few other graphical functions. The components mentioned above built on top of the four-wheel vehicle system with high torque to provide mobility on rough terrain. This work is based on Raspberry Pi and can be controlled over Wi-Fi locally or publicly over the internet. The results show making a high potential, relatively low price robot with lots of features and functions that can perform multiple tasks simultaneously, all are crucial to surveillance and monitoring problems, controlled by a user from far distances and for a long time.
The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreTool wear is a major problem in machining operations because the resulting material loss gradually changes of the machine tool. There many factors may leads to material loss like; friction, corrosion, and also it’s happened by rubbing during machining processes between the work piece and the tool. Dimensional accuracy of the work piece, and also the surface finish will be reducing by tool wear. It can also increase cutting force. In this study, we focused on the effect of the coating process on crater wear problems. Crater wear is caused by the flow between the chip and the rake face of the tool, whereas flank wear is caused by the contact between the tool and the work piece. In reducing crater wear, aluminum titanium nitride (AlTiN) u
... Show Moreيرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.
ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:
- المحاسبة نظام معلومات.
- الادارة صانعة للقرار.<
ان تقدير مسؤولية المحاسب في تصميم نظام المعلومات المحاسبي من منظور تاريخي سبقت استخدام الحاسوب كأداة معلوماتية للاعمال، لما له من رؤيا بالتطورات الرئيسية لنظام المعلومات والتي اهمها تحديد متطلبات مستخدمي المعلومات وتعيين مضمون وشكل مخرجات النظام من التقارير وتحديد مصادر البيانات وانتقاء القواعد المحاسبية الملائمة فضلاً عن الرقابة الضرورية لتكامل وفاعلية النظام.
ان النظم المحاسبية التقليدية غالبا
... Show MoreAbstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.