These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.
Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More
Leuconostoc bacteria was isolated from local pickled cabbage (Brassica oleracea capitata) and identified as Leuconostoc mesenteroides by morphology,biochemical and physiological. The local isolated L. mesenteroides bacteria under the optimal conditions of dextran production showed that, the highly production of dextran was 7.7g achieved by using a modified natural media comprised of 100ml whey, 10g refined sugar, 0.5g heated yeast extract, 0.01g CaCl2, 0.001g MgSO4, 0.001g MnCl2 and 0.001g NaCl at pH 6 and 25̊C for 24 hr of fermentation and by using 1ᵡ106 cell/ml as initial inoculums volume. Some applications in food technology (Ice cream, Loaf, Ketchup and Beef preservation) have been performed with processed dextran. The result
The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreRemoving Congo red (CR) is critical in wastewater treatment. We introduce a combination of electrocoagulation (EC) and electro-oxidation (EO) to address the elimination of CR. We also discuss the deposition of triple oxides (Cu–Mn–Ni) simultaneously on both anodic and cathodic graphite electrodes at constant current density. These electrodes efficiently worked as anodes in the EC-EO system. The EC-CO combination eliminated around 98 % of the CR dye and about 95 % of the Chemical Oxygen demand (COD), and similar results were obtained with the absence of NaCl. Thus, EC-EO is a promising technique to remove CR in an environmentally friendly pathway.
This research deals with the risks of non-compliance and its impact on the profitability of Islamic banks. Research variables were measured and analyzed as the risk of non-compliance as an independent variableand profitability as a dependent variable. The profitability was measured by three indicators ((rate of return on assets, rate of return on equity and rate of return on Total deposits)) The results of the research showed a significant relationship between the risk of non-compliance and the rate of return on assets and rate of return on total deposits, while there was no relationship between the risk of non-compliance and rate of return on ownership. The research recommended that the senior management of the Islamic Investment Bank s
... Show More