Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
Abstract
All the economic units whether productive or service units , strive to achieve specific objectives , their presence and continuity depend on them and the quality of the performance and service present to the society . This units to be able to achieve their objectives , must own basic assets to perform the activities , and apply laws , systems , and instructions , in addition to legal , managerial , and financial authorities . So this units to endeavor maintain this assets , in addition to sound application of laws ,systems . and procedures to enhance their performance . For this purpose arise the role of internal control and internal check in maintenance of assets and sound application of&n
... Show MoreAbstract
This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.
The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.
Keywords<
... Show MoreThe aim of this research is to construct a cognitive behavior program based on the theory of Meichenbaum in reducing the emotional sensitivity among Intermediate school students. To achieve the aims of the research, two hypotheses were formulated and the experimental design with equal groups was chosen. The population of research and its sample are determined. The test of negative emotional sensitivity, which is constructed by the researcher, was adopted. The test contains (20) items proved validity and reliability as a reliable test by presenting it to a group of arbitrators and experts in education and psychology. An educational program is constructed based on the theory of Meichenbaum. The test was applied to a sample of (60) second i
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show Morestudy aimed to recognize The relationship between Intrinsic Motivation Academy and Time Management among University students and measure Intrinsic Motivation Academy And Time Management for sample and Balancing Degrees of Basic Research on the two scales According to the Variable genders and Specialization, The sample consisted (350) students by (230) female (120) male , and the sample responded scales of Intrinsic Motivation Academy for (Alwan & Attaat2009) and Time Management (Building tool), The Results of this study show that: There are statistically significant differences according to gender variable in Intrinsic Motivation Academy and Time Management in favor of the male, and there are statistica
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
This research (communicative values of the visual suggestion in TV advertising) presents a precise description for the process of conveying the communicative message through employing the visual suggestion in TV advertisements. This research consists of four chapters. The first chapter includes the research problem which is summarized by the following question: what are the communicative values accomplished in Tv advertisement which produce visual suggestions that raise strangeness and tension in the advertisement?
The research importance lies in benefiting the researchers and scholars in the field of TV advertisement direction and the visual suggestion is one the main ways for building the advertisement. It also benefits the relevan
What makes the commercial advertisement distinct is the design structure which is built according to artistic and creative concepts and terms based on the visual and formal interdependence relationships to express the motives of the advertising idea, which is based in its action mechanism on the effective variables, some of which are related to the marketing aspect, and others related to the advertisement aspect. The major aspect is the functional and aesthetic variables, which are represented by the vocabulary of the advertisement area for the open spaces such as the street ads. Its promotional dimension is the active forces in the circulation of commodities and products. Therefore, there would be significant problems the designe
... Show MoreAbstract
The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.
Keywords: visual formation, poetic writing, Umayyad poetry, recipien