These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.
Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreMalaysia is linked to the countries of the Middle East by a historical relationship identified by a number of factors and determinants that affected the developments of that relationship, especially its relentless endeavor to preserve its Islamic identity with the leadership of the rest of the other ethnicities, in addition to those factors and international determinants that directly affected the typicality of this relationship and perhaps the United States stands At the forefront of who represents this international variable, as it is considered the Middle East region as a core region and within its vital field, and therefore any analog relationship in the field of international relations and one of its parties is the countries of the
... Show MoreThe topic of the research aims to consolidate the concept of fair value, and then to identify the international financial reporting standard and its role in the application of fair value in the Iraqi local environment and the possibility of using it in determining the value of the company. To achieve the goal of the research, the analytical approach was adopted for the data and information that was obtained by the researcher by conducting interviews with a number of bank and department managers in a sample of Iraqi banks registered in the Iraq Stock Exchange, and then analyzed by adopting some quantitative financial methods. The researchers reached a set of conclusions, the most important of which was the impact of fair value accoun
... Show MoreThe research aims to find out the impact of Lee’s cognitive strategy on the achievement of fifth-grade literary students in the module of history. The research community consists of the secondary female day schools of Al-Karkh Al-Oula Directorate General of Education. The size of the research sample comprises (45) female students of the fifth grade of the literary brunch, (21) students for the experimental group and (24) students for the control group. The researchers have chosen an experimental design with partial control to suit the current research and its goal. They used a unified tool to measure the achievement of female students, which consisted of (50) items characterized by sincerity and they extracted the stability of t
... Show MoreThe upbringing of Yehuda Amichai and the conditions he lived in had a great influence on his deep sense of pain, which made him think of death and suicide. Especially after the Nazis came to power in Germany, and his emigration with his family. Amichai searched for love throughout his life, and his failure was one of the most important factors affecting his psyche, which is A deep influence that made him live in harsh and painful pains that broke him, and prevented her from achieving his ambitions in life.Dramatic texts are characterized by repetition in writing and presentation. It is a textual discourse that has two advantages, first, that it can be read as a literary text like all other literary texts, and second, that it can be consider
... Show MoreThe purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreIn light of increasing demand for energy consumption due to life complexity and its requirements, which reflected on architecture in type and size, Environmental challenges have emerged in the need to reduce emissions and power consumption within the construction sector. Which urged designers to improve the environmental performance of buildings by adopting new design approaches, Invest digital technology to facilitate design decision-making, in short time, effort and cost. Which doesn’t stop at the limits of acceptable efficiency, but extends to the level of (the highest performance), which doesn’t provide by traditional approaches that adopted by researchers and local institutions in their studies and architectural practices, limit
... Show MoreIn this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show More