Preferred Language
Articles
/
bsj-6648
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Unmasking Deepfakes Based on Deep Learning and Noise Residuals
...Show More Authors

The main reason for the emergence of a deepfake (deep learning and fake) term is the evolution in artificial intelligence techniques, especially deep learning. Deep learning algorithms, which auto-solve problems when giving large sets of data, are used to swap faces in digital media to create fake media with a realistic appearance. To increase the accuracy of distinguishing a real video from fake one, a new model has been developed based on deep learning and noise residuals. By using Steganalysis Rich Model (SRM) filters, we can gather a low-level noise map that is used as input to a light Convolution neural network (CNN) to classify a real face from fake one. The results of our work show that the training accuracy of the CNN model

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Internal control – Internal check
...Show More Authors

Abstract

All the economic  units whether productive or service units , strive to achieve specific objectives , their presence and continuity depend on them and the quality of the performance and service present to the society . This units to be able to achieve their objectives , must own basic assets to perform the activities , and apply laws , systems , and instructions , in addition to legal , managerial , and financial authorities . So this units to endeavor maintain this assets , in addition to sound application of laws ,systems . and procedures to enhance their performance . For this purpose arise the role of internal control and internal check in maintenance of assets and sound application of&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
Multimedia Tools And Applications
Comparison study on the performance of the multi classifiers with hybrid optimal features selection method for medical data diagnosis
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Effects of multi- Deposition on the structural and optical properties of CdS nanocrystalline thin film prepared by CBD technique.
...Show More Authors

Cadmium sulfide (CdS) nanocrystalline thin films have been prepared by chemical bath deposition (CBD) technique on commercial glass substrates at 70ºC temperature. Cadmium chloride (CdCl2) as a source of cadmium (Cd), thiourea (CS(NH2)2) as a source of sulfur and ammonia solution (NH4OH) were added to maintain the pH value of the solution at 10. The characterization of thin films was carried out through the structural and optical properties by X-ray diffraction (XRD) and UV-VIS spectroscopy. A UV-VIS optical spectroscopy study was carried out to determine the band gap of the nanocrystalline CdS thin film and it showed a blue shift with respect to the bulk value (from 3.9 - 2.4eV). In present w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
The relationship between Intrinsic Motivation Academy and Time Management among University students
...Show More Authors

study aimed to recognize The relationship between Intrinsic Motivation Academy and Time Management among University students and measure Intrinsic Motivation Academy And Time Management for sample and Balancing Degrees of Basic Research on the two scales According to the Variable genders and Specialization, The sample consisted (350) students by (230) female (120) male , and the sample  responded scales of Intrinsic Motivation Academy for (Alwan & Attaat2009) and Time Management (Building tool), The Results of this study show that: There are statistically significant differences according to gender variable in Intrinsic Motivation Academy and Time Management in favor of the male, and there are statistica

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles
...Show More Authors

View Publication
Scopus Clarivate Crossref