These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MorePurpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata
... Show Moreينطبق مصطلح الفاعلين من غير الدول على جميع القوى أو المنظمات أو الجهات التي لا تؤسسها الدولة ولا تكون طرفاً فيها، ولها هويتها الخاصة، وتتمتع بإستقلال تام عن تمويل ومراقبة الحكومات، وتمتلك مواردها الخاصة التي تضمن لها تحقيق أهدافها في البيئة التي تنشط فيها. إن الفواعل من غير الدول بوصفها كيانات إجتماعية أو إقتصادية غير حكومية ، قد جاءت نتيجة التحول الحاصل في بنية النظام الدولي والسياسة الدولية بإتجاه النظام
... Show MoreAbstract
The research was limited to those whom Imam Abu Dawood
described in his Sunan as weak, so this research does not include
narrators who carried descriptions indicating weakness such as
ignorance or others, nor does it include hadiths that the Imam
described as weak.
The number of narrators whom Imam Abu Dawood described as
weak has reached six narrators, and my methodology was to
mention the words of Imam Abu Dawood, then transfer the
sayings of other advanced scholars, as well as the sayings of
Imam Abu Dawood in his other books, if any, to show the extent
of compatibility between these sayings.
I have reached the following resul
... Show MoreIn fact, the main idea of the manuscript is to take note of a branch of Islamic jurisprudence, which is the science of jurisprudential and this manuscript in its title and subject to the men of knowledge of jurisprudence because of its ambiguity calls for thinking, and the brainstorming mood to test the intelligence of jurisprudence, Of students of knowledge jurisprudence. This section contains (25) questions starting with the question (101) and ending with (125) .
This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni
... Show More
In fact, the main idea of the manuscript is to take note of a branch of Islamic jurisprudence, which is the science of jurisprudential jurisprudence and this manuscript in its title and subject to the men of knowledge of jurisprudence because of its ambiguity calls for thinking, and the brainstorming mood to test the intelligence of jurisprudence, Of students of knowledge jurisprudence. This section contains (28) questions starting with the question (72) and ending with (100
يعود الأرشيف إلى تورام ايلي التاجر والذي عرف في النصوص أيضا بوكيل التجار(ugula-dam-gàr)، في دوره هذا له سلطة بين التجار في مجتمعه(مجتمع التجار)، يذكر(Garfinkle) أن التجار غالبا ما اكتسبوا ألقابهم عن طريق الوراثة ذلك قد يمنح التجار حق الدخول إلى حسابات المؤسسات العامة. كان تورام ايلي تاجرا نشيطا في أعمال قروض الفضة في أواخر عهود سلالة أور الثالثة(3)، لمدة (ثمان عشرة) سنة أعتبارا من السنة الرابعة من حكم الملك أمارسن وحتى ا
... Show More