In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detection and missed detections (like in a sudden change of light in the scene). The software part is written in Matlab language as an M-file and using the Simulink library, the hardware part we used a Pentium 4 computer with a web camera or a laptop integrated camera.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Beta-thalassemia major (β-TM) is inheritable condition with many complications especially in children. The blood-borne viral infection was proposed as a risk factor due to recurrent blood transfusion regimen (hemotherapy).
This study aimed to investigate Human parvovirus B19 (PVB19) prevalence in β-TM patients by serological and molecular means.
This is a cross-section
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreThe paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera
... Show MoreReliability analysis methods are used to evaluate the safety of reinforced concrete structures by evaluating the limit state function 𝑔(𝑋𝑖). For implicit limit state function and nonlinear analysis , an advanced reliability analysis methods are needed. Monte Carlo simulation (MCS) can be used in this case however, as the number of input variables increases, the time required for MCS also increases, making it a time consuming method especially for complex problems with implicit performance functions. In such cases, MCS-based FORM (First Order Reliability Method) and Artificial Neural Network-based FORM (ANN FORM) have been proposed as alternatives. However, it is important to note that both MCS-FORM and ANN-FORM can also be time-con
... Show MoreThe present paper discusses morphological and syntactic structures of time in Russian language. The morphological and syntactic structures are considered part component of time category in Russian language.
The morphological categories of time are formed through a various types of expressions .Tenses generally express time relative to the moment of speaking. In some contexts, however, their meaning may be relativized to a point in the past ,present or future which is established in the discourse .Some languages have different verb forms or constructions and that are opposed in meaning not in syntactic category. Hence, the present study traces and compares the syntacti
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA t
... Show Moreנושא הדאיקסיס בצורה כללית הוא אחד הנושאים הלשוניים החשובים, הנושא הזה שייך לתחום הפרגמאטיקה, חשיבותו טמונה בכך שהוא אמצע הבעה חשוב בחיי היומיום שלנו, מכיוון שהוא נחשב אחד מאמצעי התקשורת בין האנשים. נושא זה קשור בקשר הדוק בהקשר, משום שהוא עוזר להסיר הדו-משמעות שבאמצעותו אנו מגיעים לרפרנטים המכוונים בצורה מדוייקת.