Preferred Language
Articles
/
bsj-6648
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Different Reinforcements on the Damping Properties of the Polymer Matrix Composite
...Show More Authors

In this research, damping properties for composite materials were evaluated using logarithmic decrement method to study the effect of reinforcements on the damping ratio of the epoxy matrix. Three stages of composites were prepared in this research. The first stage included preparing binary blends of epoxy (EP) and different weight percentages of polysulfide rubber (PSR) (0%, 2.5%, 5%, 7.5% and 10%). It was found that the weight percentage 5% of polysulfide was the best percentage, which gives the best mechanical properties for the blend matrix. The advantage of this blend matrix is that; it mediates between the brittle properties of epoxy and the flexible properties of a blend matrix with the highest percentage of PSR. The second stage

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2013
Journal Name
International Journal Of Computer Applications
Design and Simulation of Hartley based Multi Orthogonal Band OFDM
...Show More Authors

Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
ما وراء الذاكرة وعلاقته بوجهة الضبط لدى طلبة الجامعة
...Show More Authors

The research aims to identify the level meta the memory as well as the point of control and their relationship with the university students and for the purpose of verifying that these of a scale meta the memory prepared by Brewer and British as well as testing and point of control, prepared by the Nawski where the number of items of a scale meta the memory (57) ,Items The test point of the control setting, the number of items (40) items has been to make sure _ psychometrical characters have been applied instrumentson a random sample amounted to (200) students were selected in a stratified random and showed the results of research show that members of the research sample have awareness of how to work their memories, where the average grad

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (3)
Scopus
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Signals And Communication Technology
Survey on Twitter Sentiment Analysis: Architecture, Classifications, and Challenges
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Crossref