These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.
Using an environmentally friendly chemical process, a novel nanocomposite consisting of reduced graphene oxide (rGO) and silver(I) oxide (Ag2O) nanoparticles was successfully synthesized in this work, and its optical properties along with photoelectric performance were investigated. Ag2O is a narrow-bandgap p-type semiconductor with strong visible light response but exhibits poor carrier separation and structural instability during exposure to radiation. In order to overcome shortcomings encountered with Ag2O, rGO was used as a conductive support to produce rGO@Ag2O nanocomposites with improved electronic interactions. Various characterization tests, including energy-dispersive X-ray spectroscopy (EDXS), field emission scanning electron mic
... Show MoreThe Humidification-Dehumidification (HDH) desalination technique offers a viable solution for providing freshwater to populations in water-scarce, remote areas. This study experimentally investigates a novel humidifying method by cross airflow over water-wetted pottery tubes, which function as a humidifier, incorporating a thermoelectric cooler to condense water vapor for freshwater production. To optimize freshwater production and thermal efficiency, meticulous design of these components and appropriate operational parameters are selected. Experiments were performed in three environments with differing temperatures and relative humidity levels, while air velocity varied from 1.02 to 1.89 m/s, and thermoelectric cooler voltage ranged from 6
... Show MoreObjective: The present study aimed to determine the association of quality of life with the resilience of intensive care unit (ICU) nurses. Methods and Materials: A cross-sectional study was performed, including 105 ICU nurses from five hospitals in Iraq, using a convenience sample method. Data were gathered through a self-administered questionnaire that includes three sections: the demographics, the Brooks Quality of Nursing Work Life survey, and the Connor-Davidson Resilience Scale-10 (CD-RISC-10). Findings: The QWL of the ICU nurses was moderately satisfied (mean = 161.42), and the level of resilience was moderate (mean = 26). A statistically significant positive correlation between QWL and resilience. Conclusion: Strategies
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreHedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to
... Show MoreAbstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThe study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects, and correlate their expression with response to induction therapy. Circulating miR-126-3p and miR-423-5p were measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by real time PCR. The foldchange in differential expression for each gene was calculated using the comparative cycle threshold (CT) method (also known as the 2−CT method). For statistical purposes, the fold change was calculated using DDCT (or 2–∆∆Ct) method to find the relative expression of miRNAs. The expression fold change of miR-126-3p was 1.73-fold increase in patients than controls (p= 0.010). The expression fold change of miR-423-5
... Show MoreAbstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aim
... Show More