This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
The main aim of this study is to assess the performance and residual strength of post-fire non-prismatic reinforced concrete beams (NPRC) with and without openings. To do this, nine beams were cast and divided into three major groupings. These groups were classified based on the degrees of heating exposure temperature chosen (ambient, 400, and 700°C), with each group containing three non-prismatic beams (solid, 8 trapezoidal openings, and 8 circular openings). Experimentally, given the same beam geometry, increasing burning temperature caused degradation in NPRC beams, which was reflected in increased mid-span deflection throughout the fire exposure period and also residual deflectio
Background: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThere is currently a pressing need to create an electro-analytical approach capable of detecting and monitoring genosensors in a highly sensitive, specific, and selective way. In this work, Functionalized Multiwall Carbon Nanotubes, Graphene, Polypyrrole, and gold nanoparticles nanocomposite (f-MWCNTs-GR-PPy-AuNP) were effectively deposited on the surface of the ITO electrode using a drop-casting process to modify it. The structural, morphological, and optical analysis of the modified ITO electrodes was carried out at room temperature using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) images, atomic force microscopy (AFM) and Fourier transform infrared (FTIR) spectra. Cyclic voltammetry (CV) and electrochemi
... Show MoreThe aim of this study to identify the effect of using two strategies for active learning ( Jigsaw Strategy & Problems Solving) in learning some balanced beam's skills in artistic gymnastics for women , as well as to identify the best of the three methods (jigsaw strategy , problems solving and the traditional method) in learning some skills balance beam , the research has used the experimental methodology, and the subject included the students of the college of Physical Education and Sports Sciences / University of Baghdad / third grade and by the lot was selected (10) students for each group of groups Search three and The statistical package for social sciences (SPSS) was used means, the standard deviation and the (T.test), the one way a n
... Show MoreThe monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non
... Show More