Preferred Language
Articles
/
bsj-1073
Motion Recording for Surveillance Camera
...Show More Authors

In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detection and missed detections (like in a sudden change of light in the scene). The software part is written in Matlab language as an M-file and using the Simulink library, the hardware part we used a Pentium 4 computer with a web camera or a laptop integrated camera.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Using Heuristic and Branch and Bound Methods to Solve a Multi-Criteria Machine Scheduling Problem
...Show More Authors

In this paper, we investigate some methods to solve one of the multi-criteria machine scheduling problems. The discussed problem is the total completion time and the total earliness jobs  To solve this problem, some heuristic methods are proposed which provided good results. The Branch and Bound (BAB) method is applied with new suggested upper and lower bounds to solve the discussed problem, which produced exact results for  in a reasonable time.

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Pakistan Journal Of Medical And Health Sciences
Relation of red cell width diameter with some electrophysiological parameters of symptomatic sinus node patients in Iraq(Article)
...Show More Authors

Background: Dysfunction of sinoatrial node is a set of abnormal rhythms which are resulted from the sinoatrial node malfunctionof the sinus node, the chief natural cardiac pacemaker. The common, and occasionally, the single method for treatment of heart arrhythmias wasimplantation of pacemaker, which reduce symptoms exactly occurs after implantation. Aim: To detect the association between red cell width diameter (RDW) and some cardiac electrophysiology parameters in sinus node dysfunction in Iraqi patients such as SNRT and AH. Methods: A cross sectional study, was conducted on 59 patient ranging between 20-50 years old and involving 35 female and 24 male patients, suffering from an unexplained symptoms of sinoatrial node dysfunction (SND).

... Show More
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Internal Marketing on Organizational Citizenship Behavior
...Show More Authors

The aim of this paper is to determine the effect of internal marketing through three dimensions: vision, development, and reward - on organizational citizenship behavior in three private universities in Iraq. Organizations’ view of their members as internal customers could be made them more realistic in dealing with the reasons for leaving and going to other organizations. This can promote business organizations to build an organizational environment that contributes to making the organization look like the homeland of those workers. The research method is descriptive and analytical. The tool for data collection was the questionnaire. Statistical software (SPSS V.23 and AMOS V.23) was used to analyze the data. The research sample was r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Enhancement of Spectrum Sensing Performance via Cooperative Cognitive Radio ‎Networks at Low SNR
...Show More Authors

     The inefficient use of spectrum is the key subject to overcome the upcoming spectrum crunch issue. This paper presents a study of performance of cooperative cognitive network via hard combining of decision fusion schemes. Simulation results presented different cooperative hard decision fusion schemes for cognitive network. The hard-decision fusion schemes provided different discriminations for detection levels. They also produced small values of Miss-Detection Probability at different values of Probability of False Alarm and adaptive threshold levels. The sensing performance was investigated under the influence of channel condition for proper operating conditions. An increase in the detection performance was achi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Review of Automatic Speaker Profiling: Features, Methods, and Challenges
...Show More Authors

Automatic Speaker Profiling (ASP), is concerned with estimating the physical traits of a person from their voice. These traits include gender, age, ethnicity, and physical parameters. Reliable ASP has a wide range of applications such as mobile shopping, customer service, robotics, forensics, security, and surveillance systems.  Research in ASP has gained interest in the last decade, however, it was focused on different tasks individually, such as age, height, or gender. In this work, a review of existing studies on different tasks of speaker profiling is performed. These tasks include age estimation and classification, gender detection, height, and weight estimation This study aims to provide insight into the work of ASP, available dat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Skin Detection using Improved ID3 Algorithm
...Show More Authors

Skin detection is classification the pixels of the image into two types of pixels skin and non-skin. Whereas, skin color affected by many issues like various races of people, various ages of people gender type. Some previous researchers attempted to solve these issues by applying a threshold that depends on certain ranges of skin colors. Despite, it is fast and simple implementation, it does not give a high detection for distinguishing all colors of the skin of people. In this paper suggests improved ID3 (Iterative Dichotomiser) to enhance the performance of skin detection. Three color spaces have been used a dataset of RGB obtained from machine learning repository, the University of California Irvine (UCI), RGB color space, HSV color sp

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref