Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
The current study aims to identify the effect of guided visualization strategy in developing the visual perception among kindergarteners. The experimental design was used; pre-post test. A total of (32) boy and girl ranging 5 to 6 years old were selected from al-Rabeea’ kindergarten, directorate of al-karkh 2 / Baghdad. The sample divided into equal two group (16) boy and girl of each one. al-Talaqany’s (2016) visual perception skills test among kindergarteners was adopted to collect the required data. The collected data had processed based on (gender, pre-post test, and age). To achieve the objectives of the study; the researcher set up series of sessions that addressed the guided visualization strategy among kindergarteners compose
... Show MoreEnergy crisis and the requirements of health and feel good, all this renewed attention to the importance of natural lighting in all kinds of factories.
Research problem was how to achieve the plant's own natural outlets visual comfort and satisfaction of workers in Companies, the industries of cotton and general al-fedaa.
The research compuns address the impact of daylight to provide visual comfort in the factory. Indeed, the light must be treated very carefully, and natural lighting should be thinking from the perspective of the occupants of the plant and not wishing to view from the outsid
... Show MoreThe research deals with the problem of visual pollution, as it is one of the most important urban problems that cities suffer from. The concept of visual pollution has recently emerged to describe the deformation and degradation of the urban environment. Visual pollution is defined as any component of the surrounding environment that is inconsistent and not homogeneous with its natural and human components. The volume of visual pollution has doubled due to the non-compliance with the laws, regulations and controls set by the Municipality of Baghdad by the citizens, and to the weak municipal role that the municipality plays in implementing these laws. Therefore, it has become necessary to know the manifestations of visual pollution and th
... Show MoreThe theatrical show consists of theatrical techniques that form the space to display the play that may form conscious visual effects about the receiver. The current search included the (Research problem) which is the immediate question ((What makes the theatrical techniques dazzling and visually exciting in a certain theatrical show?))
It also included (the importance of research) by highlighting the importance of theatrical techniques and the mechanism of contrast.
It also identified the visual stimulus of theatrical techniques in the theater show.
It also included the (research limits), which were temporally determined by the period (1990-1998) and spatially, the Iraqi theater shows (Baghdad), in which theatrical techniques c
This study objective is to identify the visual pollution in Karrada district main streets as an example of main streets in Baghdad, the public opinion about each pollutants, solutions to reduce and eliminate the pollution were suggested as well. In order to accomplish this objective different methods were used, 16 pollutants were selected, pictures of each pollutants were taken and a questioner were distributed randomly for 270 people to evaluate the public opinion with statistical methods. Garbage, their disposal and storage areas took the first two places as the highest offensive pollutants. The people showed that they find long lines of vehicles, debris and generators appearance ranked third, fourth and fifth respectively .This resear
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More