Preferred Language
Articles
/
bsj-6648
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 10 2020
Journal Name
Journal Of Advances In Mathematics
A Study of The Density Property in Module Theory
...Show More Authors

In this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.

Publication Date
Mon Nov 12 2018
Journal Name
Arab Science Heritage Journal
العلاقة العلاقة الترابطية بين اللون والشكل في الاعمال التراثية التشكيلية
...Show More Authors

          Whatever forms embodied in nature or in the product by forming elements, Kahadjom, fonts, and colors that characterized that her aesthetic and expressive values ​​evoked to multiple indications of which are unequivocal, including what is iconic. Each one of these constituent elements of her form of extreme importance

View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
On Free Resolution of Weyl Module and Zero Characteristic Resolution In The Case of Partition (8,7,3)
...Show More Authors

View Publication Preview PDF
Scopus (17)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (22)
Crossref (14)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Room temperature flexible sensor based on F-MWCNT modified by polypyrrole conductive polymer for NO2 gas detection
...Show More Authors

This project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (25)
Crossref (12)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Genetic And Environmental Resources Conservation
Histopathological of effect of zinc on liver architecture of mice, Mus musculus
...Show More Authors

The current study was conducted to find out the effect of zinc (Zn) on the liver tissue of adult male white mouse, Mus musculus at concentrations (50 and 100 mg/kg/day) and for (30) days.(30) mice were used, divided into three groups of (10) mice, represented by control group, group of (50) mg/kg/day and (100) mg/kg/day. Histopathological changes appeared in the liver of male mice treated with zinc in concentration (50 and 100 mg/kg/day) for 30 days, including deformation and damage to Glisson's capsule, epithelial separation of capsule, in addition to cellular changes represented by hypertrophy of hepatocytes, as seen a swelling necrosis, hypertrophy of nuclei, thickening and degeneration in some hepatocytes, as well as the observed scatte

... Show More
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Alliteration strategy In Contemporary Architecture
...Show More Authors

The contemporary ideas were characterized by the abundance and diversity of their knowledge, human and conceptual production, the strategy is both a general and a detailed framework covering all design disciplines both inside and outside the field of architecture. From here, many of these terraces emerged from fields outside the field of architecture, but soon moved to form an important nerve within the field of architecture. Hence the need to define a more comprehensive framework for studying one of the concepts that can frame the framework, namely the concept of "Alliteration", and its adoption as an architectural design strategy aimed at giving the resulting form a feature of rhetoric. So the research highlighted the

... Show More
View Publication
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effectiveness of the financial analysis in the statement of the ability of financial ratios in the detection of fraud in the financial reports of industrial companies
...Show More Authors

This research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms

View Publication Preview PDF
Crossref