Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can precisely recognize the human central issues, really work on the exactness of human posture assessment, and can adjust to the intricate scenes with thick individuals and impediment. Finally, the difficulties and possible future trends are described, and the development of the field is presented.
The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Conditional logistic regression is often used to study the relationship between event outcomes and specific prognostic factors in order to application of logistic regression and utilizing its predictive capabilities into environmental studies. This research seeks to demonstrate a novel approach of implementing conditional logistic regression in environmental research through inference methods predicated on longitudinal data. Thus, statistical analysis of longitudinal data requires methods that can properly take into account the interdependence within-subjects for the response measurements. If this correlation ignored then inferences such as statistical tests and confidence intervals can be invalid largely.
Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p
... Show MoreIn this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen
... Show MoreAbstract
The research attempted to find an explanation and solution to a problem related to the fluctuation and decrease In the rate of return on assets for the research sample banks during the duration of the research, The search started from the hypothesis that, The effect of salary Domiciliation on the banking profitability of a sample of Iraqi banks participating in the salary settlement system for the period (2016-2019),The research used the descriptive historical approach, the quantitative analytical approach and the statistical approach. The research reached a set of conclusions, the most important of which is The effect of salary Domiciliation on banking profitability was achieved in three banks
... Show More