Preferred Language
Articles
/
bsj-6648
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Internal control – Internal check
...Show More Authors

Abstract

All the economic  units whether productive or service units , strive to achieve specific objectives , their presence and continuity depend on them and the quality of the performance and service present to the society . This units to be able to achieve their objectives , must own basic assets to perform the activities , and apply laws , systems , and instructions , in addition to legal , managerial , and financial authorities . So this units to endeavor maintain this assets , in addition to sound application of laws ,systems . and procedures to enhance their performance . For this purpose arise the role of internal control and internal check in maintenance of assets and sound application of&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
Comparisons of Mechanical Properties of sub-mm Lead Based and Lead Free Based Solder Using in Manufacturing of Printed Circuits
...Show More Authors

Abstract

This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.

The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.

Keywords<

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Impact of Cognitive Behavior Program Based on Meichenbaum Theory in Reducing the Negative Emotional Sensitivity among the Intermediate Stage Students
...Show More Authors

The aim of this research is to construct a cognitive behavior program based on the theory of Meichenbaum in reducing the emotional sensitivity among Intermediate school students. To achieve the aims of the research, two hypotheses were formulated and the experimental design with equal groups was chosen. The population of research and its sample are determined. The test of negative emotional sensitivity, which is constructed by the researcher, was adopted. The test contains (20) items proved validity and reliability as a reliable test by presenting it to a group of arbitrators and experts in education and psychology. An educational program is constructed based on the theory of Meichenbaum. The test was applied to a sample of (60) second i

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
The relationship between Intrinsic Motivation Academy and Time Management among University students
...Show More Authors

study aimed to recognize The relationship between Intrinsic Motivation Academy and Time Management among University students and measure Intrinsic Motivation Academy And Time Management for sample and Balancing Degrees of Basic Research on the two scales According to the Variable genders and Specialization, The sample consisted (350) students by (230) female (120) male , and the sample  responded scales of Intrinsic Motivation Academy for (Alwan & Attaat2009) and Time Management (Building tool), The Results of this study show that: There are statistically significant differences according to gender variable in Intrinsic Motivation Academy and Time Management in favor of the male, and there are statistica

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Communicative Values of Visual Suggestion in TV advertising: علاء جاسب عجيل-سارة سالم مهدي
...Show More Authors

This research (communicative values of the visual suggestion in TV advertising) presents a precise description for the process of conveying the communicative message through employing the visual suggestion in TV advertisements. This research consists of four chapters. The first chapter includes the research problem which is summarized by the following question: what are the communicative values accomplished in Tv advertisement which produce visual suggestions that raise strangeness and tension in the advertisement?
The research importance lies in benefiting the researchers and scholars in the field of TV advertisement direction and the visual suggestion is one the main ways for building the advertisement. It also benefits the relevan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Visual Variables in Exterior Advertisements Design Structure: أكرم جرجيس نعمة -عبد الله جاسم غريب
...Show More Authors

  What makes the commercial advertisement distinct is the design structure which is built according to artistic and creative concepts and terms based on the visual and formal interdependence relationships to express the motives of the advertising idea, which is based in its action mechanism on the effective variables, some of which are related to the marketing aspect, and others related to the advertisement aspect. The major aspect is the functional and aesthetic variables, which are represented by the vocabulary of the advertisement area for the open spaces such as the street ads. Its promotional dimension is the active forces in the circulation of commodities and products. Therefore, there would be significant problems the designe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
Features of visual formation in the poetry of the poets of the Umayyad era
...Show More Authors

Abstract

The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.

Keywords: visual formation, poetic writing, Umayyad poetry, recipien

View Publication Preview PDF