This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Background: Deep vein thrombosis is a multi causal disease and its one of most common venous disorder, but only one quarter of the patients who have signs and symptoms of a clot in the vein actually have thrombosis and need treatment .The disease can be difficult to diagnose. Venous ultrasound in combination with clinical finding is accurate for venous thromboembolism, its costly because a large number of patients with suspicious signs and symptoms. Venography still the gold standard for venous thromboembolism but it is invasive. The D-dimer increasingly is being seen as valuable tool rolling out venous thromboembolism and sparing low risk patients for further workup.Objectives: this study has designed the role of D-dimer to confirm diag
... Show MoreThe impact of management control systems (MCS) on organizations performance empirical research has been the subject of numerous studies during the past decade in developed and emerging economies. In the contemporary competitive, complex and changing global business environment, firms are being challenged to adopt business models that enable them to address the strategic uncertainties and risks they face in their business environments. The main issue of this study is that management accounting researchers argue that one of the ways firms can continually rejuvenate themselves to survive and succeed in these complex and uncertain environments is to understand the role of management control systems in Formulating a b
... Show MoreThis study focuses on the slab-beam interaction in one-way systems. In the context of this study, slab-beam interaction means how beam deflection can affect moment distribution in one-way slabs. This interaction is usually neglected in the traditional approximate analysis that is adopted in engineering practice and design codes. Slab positive moments have been considered as indicators on the accuracy of approximate methods, as they overestimate negative moments while underestimating positive moments.
After proposing of effecting parameters in slab-beam interaction including of panel length and width, beam dimensions, and slab thickness, Buckingham’s theorem has been adopted to transform the dimensional-mo
... Show MoreThe purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the
IRA Dawood, JOURNAL OF SPORT SCIENCES, 2016 - Cited by 3
The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThis study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More