Preferred Language
Articles
/
Ghj7dZQBVTCNdQwC2hmN
Frame-Based Change Detection Using Histogram and Threshold to Separate Moving Objects from Dynamic Background
...Show More Authors

      Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
The stylistic change in Kandinsky and Mondrian paintings
...Show More Authors

The current rasearch which is entitled " The stylistic change in Kandinsky and Mondrian paintings – A Comparative Analytic study-" deals with the nature of change concept, its mechanisms and its constructive disciplines. The research has four chapters: The first chapter deals with the methodological Framework represented by the problem of the research which is concerned with the stylistic change and its role in activating formative disciplines.                                   The research aims at, finding out the stylistic change in Kandinsky and Mondrian Paintings.&

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 08 2025
Journal Name
Fusion: Practice And Applications
Fast Numeric Sign Detection Using Adaptive Thresholding and Geometry of Optimized Fingers
...Show More Authors

A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as

... Show More
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Using of Coating Technique by Inorganic Flame Retardants to Protect Civil and Industrial Foundations from Fires
...Show More Authors

   In the present research the flame retardancy to  buildings and industrial foundations which are manufacturing from advanced polymeric  composite material was increased by coating it with surface layer included flame retardant material.  A(3mm) thick antimony tetroxide was used as a coated layer to retard and prevent the flame spread to the coating surface of polyester resin (SIROPOL 8340-PI) reinforced with hybrid fibers as a woven roving (°45-°0) consist of carbon and kevlar (49) fibers, and exposed it to direct flame generated from gas torch at temperature of (2000ºC), at  different exposed distance (10,15,20mm)and study the rang of resistance for this layer and its ability to protec

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Random Dynamic Programming in Production Planning with Application in the midland Refineries Company
...Show More Authors

 

Abstract

     This research deals with Building A probabilistic Linear programming model  representing, the operation of production in the Middle Refinery Company (Dura, Semawa, Najaif) Considering the demand of each product (Gasoline, Kerosene,Gas Oil, Fuel Oil ).are random variables ,follows certain probability distribution, which are testing by using Statistical programme (Easy fit), thes distribution are found to be Cauchy distribution ,Erlang distribution ,Pareto distribution ,Normal distribution ,and General Extreme value distribution .              &

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
THE STUDY ON ABILITY OF ESCHERICHIA COLI ISOLATED FROM DIFFERENT CLINICAL CASES TO BIOFILM FORMATION AND DETECTION OF CSGD GENE RESPONSIBLE FOR PRODUCE CURLI (FIMBRIAE)
...Show More Authors

A total of 165 clinical sample included Urine, Swab wounds and Burns were collected from Baghdad Governorate. Results showed that rate all isolates of E. coli was 50(30.3%) and rate of urine infection was 46(92%) and rate of swab wounds infection 4(8%). Where was diagnostic based on streaked on MacConkey agar, then single colony was transferred to Eosin Methylene Blue (EMB). Identification some of the biochemical test included: Catalase test, Oxidase test, Indole test, Methyl red, Vogues - Proskauer test and Citrate Utilization test. Then confirmed by the Vitek - 2 Compact System. The ability of E.coli isolate to biofilm formation to be studied it is considered one of the most important factors of virulence and has role in causing injury an

... Show More
Scopus
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref