One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our cameras system to capture the images and upload them to the Amazon Simple Storage Service (AWS S3) cloud. Then two detectors were running, Haar cascade and multitask cascaded convolutional neural networks (MTCNN), at the Amazon Elastic Compute (AWS EC2) cloud, after that the output results of these two detectors are compared using accuracy and execution time. Then the classified non-permission images are uploaded to the AWS S3 cloud. The validation accuracy of the offline augmentation face detection classification model reached 98.81%, and the loss and mean square error were decreased to 0.0176 and 0.0064, respectively. The execution time of all AWS cloud systems for one image when using Haar cascade and MTCNN detectors reached three and seven seconds, respectively.
In this work, the external switching dynamics of a Fabry-Perot etalon are studied via optical bistability system simulation. The simulated set-up of this investigation consists of two laser beams; the first beam is continuous (CW) which is considered as a biasing beam and capable of holding the bistable system for a certain range, which we are interested in, from a point that is very close self-switching to a point where the switching is unachievable. The second beam is modulated by passing the first beam through an acousto-optic modulator (AOM) to produce pulses with a minimum rise time and is used as an external source (coherent switching). In this work, we obtained the optical bistable loops by applying absorption coefficient (α) =
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
serum amylase occurs in cases of perforated peptic ulcer partly as a result of increase leakage of pancreatic enzymes rich fluid from the perforation site with subsequent absorption by peritoneal lymphatics & partly due to damage of pancreases by digestive enzymes that spilled through the perforation.
Objectives: To determine the significance of abnormally high level of serum amylase in patients undergone operation for PDU, to study the factors that tend to bring about elevated serum amylase level in these patients.
Patients and Methods: A prospective study of 250 patients with perforated duodenal ulcer (PDU) at al kindy teaching hospital, Baghdad, Iraq from June 2008- august 2010. patients were examined clinically and investig
problem of the research is the decline of the role of urban space with time as an influential system in societal relations. The research aims to define indicators for achieving social interaction in the city, and to determine indicators for achieving integration in the urban space, and to study the relationship between the integration of urban space and community interaction over time. the research assumed that by distinguishing the social interaction space from the urban space and developing urban spaces in order to be truly interactive spaces, this will help us achieve social interaction and build a positive relationship between them, which enables us to achieve integration within the urban spaces leading to social interaction. Because
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreBackground:
Objective:Fluorid-containing dental alginate impression materials can exert a considerable reduction in
enamel solubility. The objective was to evaluate the effect of fluoride addition on the setting time and
compressive strength of alginate impression materials.
Methodology: 60 samples were constructed from alginate impression material (30 samples for setting
time test and 30 samples for compressive strength test).Specimens of each test divided into three
subgroup. Group A: 10 specimens of alginate were mixed with distilled water [control], Group B: 10
specimens of alginate were mixed with100-ppm fluoride and Group C:10 specimens of alginate were
mixed with 2%Naf.
Results: the result of setting time test showed t
was studied by taking several different values for the constant α and fixing the other three variables β, c and d with the values 25.58, -0.7142857, and -1.142, respectively. The purpose of this paper is to know the values by which the system transforms from a steady state to a chaotic state under the initial conditions x, y, and z that equal -1.6, 0 and 1.6 respectively. It was found that when the value of α is equal to 0, the Chua system is in a steady state, and when the value of α is equal to 9.5 and the wave is sinusoidal, the system is in oscillation, and when α is equal 13.4 the system is in a Quasi-chaotic state, and finally the system turns to the chaotic state when the value of α equals 15.0
... Show MoreBackground: Tuberculosis (TB) is a major public health issue and a main cause of global morbidity and mortality. TB is the world's ninth leading cause of death despite the numerous treatment strategies for managing the disease.
Objective: To assess the traditional method (direct smear examination and culture) against real-time PCR as pulmonary and extrapulmonary tuberculosis laboratory diagnostic techniques.
Cases and methods: Samples were collected from (612) TB cases, (409) of whom were pulmonary tuberculosis (PTB) and (203) were extrapolmonary tuberculosis (EPTB). The cases were seeking care at the Specialized Chest and Respiratory Disease Center/ National Reference Laboratory for Tuberculosis (NRL) in Baghdad, during the period
This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.