Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and
... Show MoreThis study analyzes the features of historical and modern mosques in Jordan compared to that of Amman. The architecture of the Jordanian mosques reflects the images of great ancient empires and kingdoms of Europe and the Middle East. This has happened due to the geographical position of the country. From the studies of historians and archaeologists, comparative analysis of planning solutions, the use of plastics and decor of the facades of mosques, and the literature on the construction methods of the mosques allow us to conclude that age-old traditions have been preserved through the establishment of mosques in both the countries. Besides, the emergence of new features in constructing mosques has been observed. We find the influence of
... Show MoreTechnology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.
In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def
... Show MoreThe research aims to identify the level of increase or decrease the product cost through the activity based flexible budgeting that gives us the chance to follows the cost since the product is planed to be made till it appears in the market and it also helps to fined out any problems that are expected to happen in the future and to put the costs under control, also to know much the surveying affects the perfect use for the complete resources in order to be used in the demanded way, the research is divided in to three sides ,the first is specialized for the theoretical side, the second is for the partical side, while the third side is specialized for the conclusions and recommendations.  
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreRegression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreThe primary aim of this research was to study visual spatial attention and its impact on the accuracy of the diagonal spike in volleyball. A total of 20 volleyball players of Baghdad participated in this study. The sample was homogeneous in terms of height, weight and age of the players. The tests used in the present study were: 1) Visual Spatial Attention Test. 2) Volleyball Spike Test. Based on the findings of the study, the researcher concluded that visual spatial attention has a significant impact on the accuracy of the diagonal spike in volleyball.
The researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
The present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.