Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe study aims to identify the metamemory and perceptual speed among College students, the correlation between metamemory and perceptual speed among College students, and to which extend does metamemory contribute to perceptual speed among College students. The sample consisted of group of students were selected randomly by the researcher from five-different disciplines at the college of education for pure sciences. To collect study data, the researcher utilized two scales: perceptual speed scale that has translated to Arabic language by (Al-Shraqawi, Al- Shaikh, and Nadia Abed Al-Salam (1993). The second scale is metamemory scale (2002) which has translated to Arabic by Abu Ghazal (2007). The results revealed that college students have
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreCan not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show More