This paper presents an efficient system using a deep learning algorithm that recognizes daily activities and investigates the worst falling cases to save elders during daily life. This system is a physical activity recognition system based on the Internet of Medical Things (IoMT) and uses convolutional neural networks (CNNets) that learn features and classifiers automatically. The test data include the elderly who live alone. The performance of CNNets is compared against that of state-of-the-art methods, such as activity windowing, fixed sample windowing, time-weighted windowing, mutual information windowing, dynamic windowing, fixed time windowing, sequence prediction algorithm, and conditional random fields. The results indicate that CNNets are competitive with state-of-the-art methods, exhibiting enhanced IoMT accuracy of 98.37%, which is the highest among the proposed solutions using the same dataset.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreUrban wetlands are one of the complex systems that provide many economic, social and environmental services to the city. In this research, the most important services provided by urban wetlands from the point of view of the urban planner were reviewed, and the types of these lands and their divisions according to the type of services provided by each type were presented. Environmental is represented in its ability to reduce the dangers of floods, mitigate the climate and reduce its negative impacts, purify water and deplete a lot of suspended impurities and pollutants, and social services such as recreational areas and beautiful landscapes that inspire joy and reassurance in the soul, as well as cultural areas and sports activities for m
... Show MoreThis paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.
An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreIn this paper, we study a new concept of fuzzy sub-module, called fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense. This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
الملخص ان حق الملكية هو الحق الاوسع نطاقا يمنح صاحبه صلاحية ممارسة السلطات كافة ويكون محل هذه السلطات كل ما يملك الشخص سواء كان شقه او طبقة اسوة بالعقارات الاخرى كدار للسكن او ارض ، ومن اهم هذه السلطات واوسعها نطاقا ( هو سلطة التصرف ). تعد هذه السلطة جوهر حق الملكية وأخطر السلطات الممنوحة للمالك كونه بواسطتها يمكنه الاستغناء عن ملكه بأي تصرف ناقل له كالبيع أو الهبة او الوصية مثلا ، ولأهمية هذه السلط
... Show MoreField of translation is sampled with many types of translation, such as the literary, scientific, medical, etc. The translation of grammatical aspects has always been with difficulties.
Political translation is the focus here. There are many general problems faced by translators when translating political texts from Arabic into Spanish. The aim here is to clarify the definition of functions or terms within the text, and to arrive at the correct from of translation of such texts from Spanish into Arabic. It is worth mentioning that the paper is of two parts: the first exemplifies what is meant by translation, the prerequisites of a translator, along with mentioning the methods followed&nbs
... Show More