Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA) has been proposed.
Via using the MCA associative memory as a new trend, the proposed module goes through two phases: the
first is the training phase (which is executed once during the module installation process) and the second is
the analysis phase. Both phases will be developed through the use of MCA, each according to its process.
The training phase will take place through the learning phase of MCA, while the analysis phase will take
place through the convergence phase of MCA. The use of MCA increases the efficiency of the training
process for the proposed system by using a minimum number of training images that do not exceed 10
training images of the total number of frames in JPG format. The proposed module has been evaluated using
11,825 images that have been extracted from 11 tested videos. As a result, the module can detect the intruder
with an accuracy ratio in the range of 97%–100%. The average training process time for the training videos
was in the range of 10.2 s to 23.2 s.
In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between transmitter and receiver. The MLPN provides different pseudo-random sequence lengths. This work provides the ability to implement MLPN practically
... Show MoreMulti-nationalities companies are the main companies in the progressed
countries that improve the current technology and, thus, become the main source of it.
These companies, in the first place, aim to increase the profits of its
investments to satisfy stock holders in the original countries to which these companies
belong.
It is a mean to interfere in the economic of countries especially the growing
ones and exploit their important natural resources. Since this research focus on the
dangers of these companies, mechanism of its work and its dangers on the most
important natural resources of our country which is oil; therefore, the research
confirm that this important natural treasure must be under an Iraqi cont
In this study, nanocomposites have been prepared by adding
multiwall carbon nanotubes (MWCNTs) with weight ratios (0, 2, 3,
4, 5) wt% to epoxy resin. The samples were prepared by hand lay-up
method. Influence of an applied load before and after immersion in
sodium hydroxide (NaOH) of normality (0.3N) for (15 days) at
laboratory temperature on wear rate of Ep/MWCNTs
nanocomposites was studied. The results showed that wear rate
increases with increasing the applied load for the as prepared and
immersed samples and after immersion. It was also found that epoxy
resin reinforced with MWCNTs has wear rate less than neat epoxy.
The sample (Ep + 5wt% of MWCNTs) has lower wear rate. The
immersion effect in base so
In this article, the solvability of some proposal types of the multi-fractional integro-partial differential system has been discussed in details by using the concept of abstract Cauchy problem and certain semigroup operators and some necessary and sufficient conditions.
In this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was studied
... Show MoreIn this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was stu
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show More