Preferred Language
Articles
/
joe-1349
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN, YOLO, and SSD for effective drone detection in various environments. We have found that both Faster RCNN and YOLO have high recognition ability compared to SSD; on the other hand, SSD has good detection ability.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 02 2025
Journal Name
Economics And Administrative Studies Journal (easj) (formerly Al-dananeer Journal)
The use of the MADC indicator for entry and exit from financial market.
...Show More Authors

View Publication
Publication Date
Thu Aug 08 2019
Journal Name
Political Sciences Journal
The Neo-Conservative and call for the dominance of US military power globally
...Show More Authors

Abstrct

The administrations of Presidents Clinton and Bush Jr. have seen the emergence of neoconservatives. The neoconservative were the establishment of the Project for the New American Century (PNAC) project in 1997 during the Clinton administration. The neoconservatives, through the New Century Project, were able to make important foreign policy decisions, notably the Iraq Liberation Law, which was passed by Congress on January 26, 1998 and signed by President Clinton and became a law legitimized. Clinton became authorized to take whatever measures he saw fit to contribute to regime change in Iraq. The Bush administration has also undergone major and significant shifts in US strategy on US foreign policy. During the Bush admin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computer Modeling In Engineering & Sciences
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Simulation and Modeling of Detailed Load flow Analysis for the 400kVA and 132kVA Iraqi Grid
...Show More Authors

A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Management In Engineering
Identifying Pertinent Indicators for Assessing and Fostering Diversity, Equity, and Inclusion of the Construction Workforce
...Show More Authors

View Publication
Scopus (69)
Crossref (70)
Scopus Clarivate Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine &amp; Toxicology
Assessment the Effect of Lactobacillus Acidophilus on Escherichia Coli Serotype O157:H7 with Detection of Some Virulence Factors
...Show More Authors

Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (A

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF