Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
תקציר
העיון הזה מדבר על דבר ההשגה על הטקסטים המקראיים בידי כמה מסופרים ופילוסופים יהודים אשר הושפעו מהרעיונותיהם של הפילוסופים האירופיים מחד גיסא, ואת הרעיונות של ההשכלה מאידך גיסא. היהודים היו חיים בבידוד, ותחת השליטה של הרבנות (רבנים) שהייתה שליטה מוחלטת. כבר העבודה של הרבנות מאז ימי קדם להעלות רעיונות במוחם של היהודים בתור העם הנבחר, והם מעולים ועדיפים על בני אדם. הם כל כך מסתמכים על פסוקים מה
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
The searchers opinions are variant in determining the extent of impacting political risk in the host country on foreign direct investment decision. (Aharoni,1966) found, in his questionary study for group of foreign companies operating in India, that a political stability is one of the two most important factors, besides the market size, in the attraction of foreign investment, and its availability means that whether this specific country is good for foreign investment. On the other side, (Green and Benntt, 1972) are present a variant opinion to Aharonis opinion. They are reach to result state that a political instability do not impact on the general distribution of foreign i
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreHighlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreAbstract
This study aims to identify the empathy of University Students, as well as the significant differences in sympathy in terms of gender and specialization. To achieve the aims of the study, a scale of empathy was administered to a sample of (450) students collected randomly from Baghdad university. The results showed that the study sample has a level of empathy. There is a significant difference between males and females in empathy, in favor of the female students. There is no significant difference in empathy in terms of specialization (scientific, humanities), and the interaction between males and females. The study came out with a number of recommendations and suggestions.
This paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law