Preferred Language
Articles
/
bsj-6648
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 24 2020
Journal Name
Neuroimaging - Neurobiology, Multimodal And Network Applications
Electroencephalogram Based Biomarkers for Detection of Alzheimer’s Disease
...Show More Authors

Alzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Making use of economical design techniques and materials in implementing cosmetic supplements to the interior spaces of the dwelling: رانيه علي احمد عبد الرحمن
...Show More Authors

  This research aims to identify the economic design techniques and materials that can be used in the implementation of cosmetic supplements to the spaces of the dwelling. The research relied on the descriptive and analytical approach by describing and analyzing models of design techniques and materials that can be used in the production of cosmetic supplements in the interior spaces of the dwelling.
The results of the research concluded that the beautification of the spaces of the dwelling is one of the necessary and important pieces to add aesthetic touches to the internal spaces, and that the use of economic design techniques and materials contributes to the implementation of many pieces of complementary beautification of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
ما وراء الذاكرة وعلاقته بوجهة الضبط لدى طلبة الجامعة
...Show More Authors

The research aims to identify the level meta the memory as well as the point of control and their relationship with the university students and for the purpose of verifying that these of a scale meta the memory prepared by Brewer and British as well as testing and point of control, prepared by the Nawski where the number of items of a scale meta the memory (57) ,Items The test point of the control setting, the number of items (40) items has been to make sure _ psychometrical characters have been applied instrumentson a random sample amounted to (200) students were selected in a stratified random and showed the results of research show that members of the research sample have awareness of how to work their memories, where the average grad

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 26 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE CORRELATION BETWEEN IRAQI EFL UNIVERSITY STUDENTS WORKING MEMORY CAPACITY AND THEIR LANGUAGE PROFICIENCY
...Show More Authors

View Publication
Crossref
Publication Date
Tue May 07 2019
Journal Name
Acm Journal On Emerging Technologies In Computing Systems
Neuromemrisitive Architecture of HTM with On-Device Learning and Neurogenesis
...Show More Authors

Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Multi-pages structure for Six Sigma performance matrix based on the technical characteristics of balanced performance and methodology Al-Sigma for measuring corporate performance: Suggestion vision
...Show More Authors

Accelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly bet

... Show More
View Publication Preview PDF
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref