Recently, Human Activity Recognition (HAR) has been a popular research field due to wide spread of sensor devices. Embedded sensors in smartwatch and smartphone enabled applications to use sensors in activity recognition with challenges for example, support of elderly’s daily life . In the aim of recognizing and analyzing human activity many approaches have been implemented in researches. Most articles published on human activity recognition used a multi -sensors based methods where a number of sensors were tied on different positions on a human body which are not suitable for many users. Currently, a smartphone and smart watch device combine different types of sensors which present a new area for analysis of human attitude. This paper presents a review on methodologies applied to solve problems related to human activity recognition that use the equipped sensors in smartphone and smartwatch with the employ of Machine Learning and the advance of deep learning approaches. The literature is summarized from four aspects: sensors types, applications, Machine Learning (ML) and Deep Learning (DL) models, results and challenges.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The Purpose of this Research show gap between a Normal Cost System and Resource consumption Accounting Applied in AL-Rafidin Bank.
The Research explores that, how the idle capacity can be determined under resource consumption accounting, discuss the possibility of employing these energies. Research also viewed how costs can be separated into Committee and Attribute. Resource Consumption Accounting assists managers in pricing services or products based on what these services or products use from each Source.
This Research has been proven
In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreI've made extensive studies on the distribution of the electric field stable heterogeneous within intensive that contain metal rings with slope diagonal positive to a site halfway to be in its maximum value, followed by decline negative and equally to the other end of the concentrated distributed by electric stable thanking sequentially and have focused empirical studies in the pastthe molecules that you focused Pantqaúha during passage
A microbubble air flotation technique was used to remove chromium ions from simulated wastewater (e.g. water used for electroplating, textiles, paints and pigments, and tanning leather). Experimental parameters were investigated to analyze the flotation process and determine the removal efficiency. These parameters included the location of the sampling port from the bottom of the column, where the diffuser is located to the top of flotation column (30, 60, and 90 cm), the type of surfactant (anionic, SDS, or cationic, CTAB) and its concentration (5, 10, 15, and 20 mg/L), the pH of the initial solution (3, 5, 7, 9, and 11), the initial contaminant concentration (10, 20, 30, and 40 mg/L), the gas flow rate (0.1, 0.2, 0.3, and 0.5 L/mi
... Show MoreX-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin
... Show MoreBioethanol is an attractive fuel with higher potential for energy security and environmental safety. Olive solid residues were used as a raw material for the production of bioethanol through the use of different preliminary treatments . Separate treatments with cellulose, hydrochloric acid (HCl 5%), sulfuric acid (H2SO4 2%), and liquid ammonia NH4OH (20%) were used to convert cellulose and hemicellulose into monosaccharaides. The production of ethanol was observed during the fermentation process using R. minuta under anaerobic conditions. After 3 days of fermentation, lowest concentrations of ethanol of 0.233, 0.249, 0.261, and 0.275 g/ l were produced from ol
... Show MoreReferral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the and articles, as expressed by a particular client, and is a combination of affi
... Show MoreThe OSPF cost is proportionally indicated the transmitting packet overhead through a certain interface and inversely proportional to the interface bandwidth. Thus, this cost may minimized by direct packet transmitting to the other side via various probable paths simultaneously. Logically, the minimum weight path is the optimum path. This paper propose a novel Fuzzy Artificial Neural Network to create Smart Routing Protocol Algorithm. Consequently, the Fuzzy Artificial Neural Network Overlap has been reduced from (0.883 ms) to (0.602 ms) at fuzzy membership 1.5 to 4.5 respectively. This indicated the transmission time is two-fold faster than the standard overlapping time (1.3 ms).
The Web Design Quality Index, known as WDQI, was applied to assess the quality of websites for six Iraqi universities, namely Basra University, Mosul, Muthanna, Samarra, Dijla University College, and Al-Isra University College. The results of the index showed that the universities of Basra and Dijla University College had the highest value, at 71.07 and 70.39, respectively. Its final evaluation metric was that the website of these two universities needed a slight improvement. As for the rest of the other universities, the final values of the index ranged from 64.72-69.71. When the final values of the index are displayed on the final evaluation scale, it appears that the websites of the four universities need many improvements. The study
... Show More