The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities to analyze, detect and track objects plus few other graphical functions. The components mentioned above built on top of the four-wheel vehicle system with high torque to provide mobility on rough terrain. This work is based on Raspberry Pi and can be controlled over Wi-Fi locally or publicly over the internet. The results show making a high potential, relatively low price robot with lots of features and functions that can perform multiple tasks simultaneously, all are crucial to surveillance and monitoring problems, controlled by a user from far distances and for a long time.
The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreThe physical, the thermal and the mechanical properties of Nano-composites, that consisted of Polyprime EP epoxy that reinforced by multi-walled carbon nanotubes (MWCNTs), have been studied. Various loading ratios, 0.1, 0.5, and 1 wt. %of MWCNT shave been infused into epoxy by a magnetic stirrer and then the hardener mixed with the mthat supplied with the epoxy. All sample shave been cutting using CNC machine. Tensile test, three-point bending, hardness tests, lee's disk, differential scanning calorimetry, water absorption and dielectric and electrical conductivity test were utilized on unfilled, MWCNT-filled epoxy to identify the loading effect on the properties of materials. Scanning electron microscopy (SEM) was used to determine the
... Show MoreIn this work, synthesis of conducting polymeric films namely, PVC thin films was carried out containing Schiff base (L) with Cu2+, Cr3+, Ni2+, Co2+, in addition to inspecting the possibilities of measuring energy gap values of PVC-L-M with variety metal ions. These new polymeric films (PVC-L-M) were characterized by FTIR spectrophotometry, energy gap and surface morphology. The optical data recorded that the band gap values are influenced by the type of metals. All modified films have a red shift in optical properties in the ultraviolet region. The PVC-L-Co(II) was the lowest value of the optical band gap, 3.1 eV.
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
ان تقدير مسؤولية المحاسب في تصميم نظام المعلومات المحاسبي من منظور تاريخي سبقت استخدام الحاسوب كأداة معلوماتية للاعمال، لما له من رؤيا بالتطورات الرئيسية لنظام المعلومات والتي اهمها تحديد متطلبات مستخدمي المعلومات وتعيين مضمون وشكل مخرجات النظام من التقارير وتحديد مصادر البيانات وانتقاء القواعد المحاسبية الملائمة فضلاً عن الرقابة الضرورية لتكامل وفاعلية النظام.
ان النظم المحاسبية التقليدية غالبا
... Show Moreيرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.
ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:
- المحاسبة نظام معلومات.
- الادارة صانعة للقرار.<
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show More