Preferred Language
Articles
/
bsj-1073
Motion Recording for Surveillance Camera
...Show More Authors

In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detection and missed detections (like in a sudden change of light in the scene). The software part is written in Matlab language as an M-file and using the Simulink library, the hardware part we used a Pentium 4 computer with a web camera or a laptop integrated camera.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Structures
Accelerating reliability analysis of deteriorated simply supported concrete beam with a newly developed approach: MCS, FORM and ANN
...Show More Authors

Reliability analysis methods are used to evaluate the safety of reinforced concrete structures by evaluating the limit state function 𝑔(𝑋𝑖). For implicit limit state function and nonlinear analysis , an advanced reliability analysis methods are needed. Monte Carlo simulation (MCS) can be used in this case however, as the number of input variables increases, the time required for MCS also increases, making it a time consuming method especially for complex problems with implicit performance functions. In such cases, MCS-based FORM (First Order Reliability Method) and Artificial Neural Network-based FORM (ANN FORM) have been proposed as alternatives. However, it is important to note that both MCS-FORM and ANN-FORM can also be time-con

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Desulfurization of Diesel Fuel by Oxidation and Solvent Extraction
...Show More Authors

This research presents a study in ultra-desulfurization of diesel fuel produced from conventional hydro desulfurization process, using oxidation and solvent extraction techniques. Dibenzothiophene (DBT) was the organosulfur compound that had been detected in sulfur removal. The oxidation process used hydrogen peroxide as an oxidant and acetic acid as homogeneous catalyst . The solvent extraction process used acetonitrile (ACN) and N-methyl – 2 - pyrrolidone (NMP) as  extractants . Also the effect of five parameters (stirring speed :150 , 250 , 350 , and 450) rpm, temperature (30 , 40 , 45 , and 50) oC, oxidant/simulated diesel fuel ratio (0.5 , 0.75 , 1 , and 1.5) , catalyst/oxidant ratio(0.125,0.25,0.5

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Medical Journal Of Babylon
Detection of Human Parvovirus (B19) in Beta Thalassemia Major Patients
...Show More Authors
Abstract<sec> <title>Background:

Beta-thalassemia major (β-TM) is inheritable condition with many complications especially in children. The blood-borne viral infection was proposed as a risk factor due to recurrent blood transfusion regimen (hemotherapy).

Objectives:

This study aimed to investigate Human parvovirus B19 (PVB19) prevalence in β-TM patients by serological and molecular means.

Materials and Methods:

This is a cross-section

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Production, Extraction, and Purification of An Extracellular Melanin Pigment from Clinically Isolated Pseudomonas aeruginosa
...Show More Authors

Introduction: Melanin is a high-molecular weight pigment produced through the oxidative polymerization of phenolic or indolic compounds and plays a perfect role in UV-light shielding, as well as in photoprotection. Among biopolymers, melanin is unique in many aspects. This study is designed to screen Production, extraction and characterizes of an extracellular melanin pigment from clinically isolated P. aeruginosa. Objective: The aim of the current study is isolation and diagnosis of P.aeruginosa using vitek-2 compact system and screening the ability to produce melanin and characterization of extracted melanin by UV-vis, FTIR, XRD and SEM. Materials and methods: the samples swab inoculated on cetrimide agar as selective media and incubated

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The reality and dilemmas of higher education in IraqAnalytical vision in knowledge economies
...Show More Authors

The subject of education, and since time immemorial, gripe the attention of the religious, intellectual, political, social and economic elites. This attention not only in Iraq, but in different countries in the world. There is a close correlation between the educational level of the societies and the edginess of its rising and advancement in all fields.

In order to achieve the research objectives, the research has   been divided into three sections: section I include the historical, scientific, humanitarian evolution of education, starting from the first economic revolution (The Agricultural revolution) through the second economic revolution (The Industrial Revolution) and till the Third Economi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Importance of Strategic Orientation Dimensions in the Iraqi National Security Service: An Analytical Study
...Show More Authors

The current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was

... Show More
View Publication Preview PDF
Crossref