Preferred Language
Articles
/
JBb3H4cBVTCNdQwCSTko
Improvement of Alert System against Tampering and Theft in Surveillance Cameras

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, which allow fast action by the administrator to fix such tampering. The results show that selecting of threshold equal to two was fair in detecting motion and value of five, in case of changing the camera direction through testing of fast and slow motions.

View Publication
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
Background modeling in video surveillance by using parallel computing

In the last years, the research of extraction the movable object from video sequence in application of computer vision become wide spread and well-known . in this paper the extraction of background model by using parallel computing is done by two steps : the first one using non-linear buffer to extraction frame from video sequence depending on the number of frame whether it is even or odd . the goal of this step is obtaining initial background when over half of training sequence contains foreground object . in the second step , The execution time of the traditional K-mean has been improved to obtain initial background through perform the k-mean by using parallel computing where the time has been minimized to 50% of the conventional time

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Root Cause Analysis And Improvement In Windows System Based On Windows Performance Toolkit WPT

       Performance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigat

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Engineering And Technology Journal
Performance Improvement of Multi-UserMC-CDMA system Using Discrete Hartly Transform Mapper

Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
the Employing Quranic studies in the social aspect: (The verses of Hudud, the limit of murder and theft as a model)

Research Summary

Praise be to God, and may blessings and peace be upon the Messenger of God. As for:

The Noble Qur’an is the constitution of life, and a comprehensive educational approach that deals with individuals comprehensively, as it organizes worldly and eschatological life, and it is a curriculum concerned with organizing life starting with individuals and the family until the establishment of states, and from its comprehensiveness is reform, guidance and establishing boundaries. They have a disease in their hearts. They are exposed to this and are trying, by falsehood, to subjugate the Islamic world with man-made laws set by the West. Their aim is to distance people from

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Evaluation of the Surveillance and Epidemiological Aspects of Cutaneous Leishmaniasis in Babylon Province, Iraq

Leishmaniasis diseases constitute an important public health problem in both tropical and subtropical areas. The aim of this study is to evaluate the epidemiological situation of cutaneous leishmaniasis (CL) in Babylon province, Iraq. The current work included the recording of 142 new cases of CL infection in Babylon province for the period from November 2019 to February 2020. Male infection was represented by 87 cases (61.27%), while females composed 55 samples (38.73%), with a significant difference (p<0.05) between the two groups. The age group of 5-14 years was found to have the highest recorded CL cases  (56; 39.44%), while the age group of less than one year had the lowest  cases  (1; 0.70%), with the differences

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Acute Flaccid Paralysis Surveillance System's Structure at Al-Russafa Health Directorate in Baghdad City

Objective: evaluation of Acute Flaccid Paralysis Surveillance (AFP) System's Structure at Al-Russafa Health directorate in Baghdad City. Methodology: descriptive study using evaluation approach conducted to measure the efficiency of AFP Surveillance System structure for period from November 27th 2014 to June 30th 2015. The study adopted the non-probability multi-stage sampling approach. As nineteen health facilities under surveillance are chosen and interview is conducted with a total of 50 health worker how are involved in the AFP Surveillance System. The data are gathered from sample by using question

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Virulence surveillance of wheat black stem rust fungus

General survey for wheat rust diseases in Iraqi fields was done during the seasons of 2010, 2011 and 2012. The survey covered different fields in southern, middle and northern regions. Results of the first season indicated that most of Iraqi cultivars such as Tmmoze2, IPA 99 and Mexipak showed different types of susceptibility to both yellow and leaf rust infection. Disease severity increased when the conditions were favorable for infections with using susceptible cultivars. The severity of leaf rust was less in the north region comparing with the middle and south regions. Most of the introduced cultivars such as Sham6 and Cimmyto showed susceptible reaction to yellow and leaf rust. Yellow rust was in epiphytotic form at the Iraqi-Syrian-Tu

... Show More
Crossref
View Publication Preview PDF