These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.
This study aimed at isolating uropathogenic Escherichia coli from urinary tract infections (UTIs) of human and cattle to examine the molecular diversity and phylogenetic relationship of the isolates. A total of 100 urine samples were collected from UTIs of human and cattle. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was tested against 10 antimicrobials. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to identify the genetic diversity among E. coli isolates from human and animal origin by using five different octamer primers. The gelJ software for the phylogenetic analysis created Dendrograms. Out of 50 human urine samples, E.
... Show MoreFace Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreThe research aims at evaluating the illustrations images and determining the availability of good image standards in the illustrations images of the content of the second intermediate stage computer's book for the academic year (2019-2020) as seen by computer teachers. The sample was randomly selected, (30) teachers who are actually teaching the subject in schools within the geographical area of the province of Baghdad (Karkh III). To achieve this goal, ten standards were identified: scientific accuracy, suitability for the level of students, image clarity, image freshness, quality of coloring, suitability of its location of the subject, Matching their content glimpsed, The subject matter is appropriate in terms of area, matching its tit
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreThis research includes a study of the ability of Iraqi porcelanite rocks powder to remove the basic Safranine dye from its aqueous process by adsorption. The experiments were carried out at 298Kelvin in order to determine the effect of the starting concentration for Safranin dye, mixing time, pH, and the effect of ionic Strength. The good conditions were perfect for safranine dye adsorption was performed when0.0200g from that adsorbed particles and the removal max percentage was found be 96.86% at 9 mg/L , 20 minutes adsorption time and at PH=8 and in 298 K. The isothermal equilibrum stoichiometric adsorption confirmed, the process data were examined by Langmuir, Freundlich and Temkin adsorption equations at different temperatures
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIn the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by surface chemical reactio
... Show MoreIt is known that the oral administration of ibuprofen caused an irritation of stomach as a side effect due to its carboxylic moiety. Ibuprofen ester was synthesized by linking the carboxylic moiety of ibuprofen and the hydroxylic group of paracetamol to reduce its side effect. Study the kinetic hydrolysis of prepared ester was examined at different values of physiological pH (1.0, 5.8, 6.4 and 7.4) at 37 ± 0.1 of 1 hour period. Measurements of absorbance were carried out by UV-Visible spectrophotometer to follow the stability of ester, it showed Pseudo first order hydrolysis. The pH- apparent rate profiles of ester was exhibited a good stability at pH 1.0 and pH 5.8. Pharmacological activity in vivo of prepared ester was evaluated in re
... Show MoreIn the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by
... Show More