Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MorePurpose: The purpose of this study was to clarify the basic dimensions, which seeks to indestructible scenarios practices within the organization, as a final result from the use of this philosophy.
Methodology: The methodology that focuses adoption researchers to study survey of major literature that dealt with this subject in order to provide a conceptual theoretical conception of scenarios theory .
The most prominent findings: The only successful formulation of scenarios, when you reach the decision-maker's mind wa takes aim to form a correct mental models, which appear in the expansion of Perception managers, and adopted as the basis of the decisions taken. The strength l
... Show MoreAbstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreIn this paper, we prove some coincidence and common fixed point theorems for a pair of discontinuous weakly compatible self mappings satisfying generalized contractive condition in the setting of Cone-b- metric space under assumption that the Cone which is used is nonnormal. Our results are generalizations of some recent results.
المقدمة:
مع مطلع القرن الحادي والعشرين فأن الصراع على امدادات المياه الحيوية هو خطر قائم على الدوام في جميع مناطق العالم حيث يتجاوز الطلب على الماء بشكل كبير العرض القائم ولكون اغلب المصادر الرئيسة للمياه وخاصة في المنطقة العربية يشترك فيها بلدان أو أكثر ولان هذه الدول نادرا ما توافق على الاجراءات التفاوضية الخاصة بأقتسام الامداد المتاح من المياه مما يعني زيادة الخلافات على الوصول الى الم
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
This research investigates solid waste management in Al-Kut City. It included the collection of medical and general solid waste generated in five hospitals different in their specialization and capacity through one week, starting from 03/02/2012. Samples were collected and analyzed periodically to find their generation rate, composition, and physical properties. Analysis results indicated that generation rate ranged between (1102 – 212) kg / bed / day, moisture content and density were (19.0 % - 197 kg/ m3) respectively for medical waste and (41%-255 kg/ m3) respectively for general waste. Theoretically, medical solid waste generated in Al-Kut City (like any other city), affected by capacity, number of patients in a day, and hosp
... Show MoreIn this paper, we investigate the behavior of the bayes estimators, for the scale parameter of the Gompertz distribution under two different loss functions such as, the squared error loss function, the exponential loss function (proposed), based different double prior distributions represented as erlang with inverse levy prior, erlang with non-informative prior, inverse levy with non-informative prior and erlang with chi-square prior.
The simulation method was fulfilled to obtain the results, including the estimated values and the mean square error (MSE) for the scale parameter of the Gompertz distribution, for different cases for the scale parameter of the Gompertz distr
... Show MoreThis article is part of the bigger project of my PhD thesis which investigates the influence of the British war poetry of the twentieth century on the development of Iraqi poetry in the century/Plymouth University/UK. The article examines the influences of British poetry on the development of the forms of poetry in Iraq after the Second World War. The aim is to shed the light on the creation of the ‘third product’ or the Iraqi poetry that shows the influences of the translated British poetry or the ‘second product’; which was written in prose for it is almost impossible to transfer the rhyme and rhythm of poetry from one language to another. Those who translated the poetry where also the pioneers of the major formal revolution in Ar
... Show More
Abstract of the research:
This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that It should be undertaken and studied by researchers; Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic. In the
... Show More