Deep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing items in images. This article, will be focusing on comparing the main differences among the YOLO version's Architecture, and will discuss its evolution from YOLO to YOLOv8, its network architecture, new features, and applications. And starts by looking at the basic ideas and design of the first YOLO model, which laid the groundwork for the following improvements in the YOLO family. In additionally, this article will provide a step-by-step guide on how to use the YOLO version architecture, Understanding the primary drivers, feature development, constraints, and even relationships for the versions is crucial as the YOLO versions advance. Researchers interested in object detection, especially beginning researchers, would find this paper useful and enlightening.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreJoint diseases, such as osteoarthritis, induce pain and loss of mobility to millions of people around the world. Current clinical methods for the diagnosis of osteoarthritis include X-ray, magnetic resonance imaging, and arthroscopy. These methods may be insensitive to the earliest signs of osteoarthritis. This study investigates a new procedure that was developed and validated numerically for use in the evaluation of cartilage quality. This finite element model of the human articular cartilage could be helpful in providing insight into mechanisms of injury, effects of treatment, and the role of mechanical factors in degenerative
conditions, this three-dimensional finite element model is a useful tool for understanding of the stress d
The research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe study aimed to investigate the effect of using the intructional computer individually or through the cooperative groups on the achievement of the ninth grade students in mathematics compared to the traditional method. The experimental method adapted three groups out of three schools were chosen, two groups of the students where applied the computer method. The comtrol group used the simple random method, and it used the diagnostic test as tool for the study.The result showed that there is a statistically significant difference between the mean scores of the experimental groups and the control group on the post-test for the two experimental groups.
Abstract
The current research aims to identify the level of E-learning among middle school students, the level of academic passion among middle school students, and the correlation between e-learning and academic passion among middle school students. In order to achieve the objectives of the research, the researcher developed two questionnaires to measure the variables of the study (e-learning and study passion) among students, these two tools were applied to the research sample, which was (380) male and female students in the first and second intermediate classes. The research concluded that there is a relationship between e-learning and academic passion among students.
The aim of the research is to identify learning difficulties and their role in children's perception of self-concept. The researcher adopted the descriptive and analytical approach method in this study. A questionnaire was designed by the researcher to collect some related information such as biodata, family, health, diagnostic and behavioral patterns of the case. In addition, the researcher adopted the scale of learning difficulties for elementary school students prepared by Zaidan Ahmed Al-Sartawi (1995), the scale of student appreciation for the survey of learning difficulties for primary school students by Michael Best, which was translated to the Arabic language by (Saeed Abdullah Debis). The researcher adopted also the Self-Concept
... Show MoreAn essential element in English as a foreign language (EFL) learning is vocabulary. There is a big emphasis on learning the new words' meaning from the books or inside classrooms. Also, it is a major part of language teaching as well as being fundamental to the learner but there is a big challenge in vocabulary instruction due to the weak confidence by teachers in selecting the suitable practice in teaching vocabulary or they sometimes unable to specify a suitable time for it during the teaching process. The major aim of this study is to investigate the value of posters in vocabulary learning on the 2nd grade students at Halemat Alsaadia High School in Baghdad – Iraq. It hypothesized that there are no statistically significant differences
... Show More