Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this research, it is adopted for segmentation and tracking purposes. The proposed object tracking algorithm is initiated by detecting the target moving object manually. Then, the ADFAM convergence of the current video frame is reused as an initial estimation for the next video frame and so on. The proposed algorithm is applied to several video sequences, different in terms of the nature of the object, the nature of the background, the speed of the object, object motion direction, and the inter-frame displacement. Experimental results show that the proposed algorithm performed very well and successfully tracked the target object in all different cases.
In this study, nano TiO2 was prepared with titanium isopropoxide (TTIP) as a resource to titanium oxide. The catalyst was synthesized using phosphotungstic acid (PTA) and, stearyl trimethyl ammonium bromide (STAB) was used as the structure-directing material. Characterization of the product was done by the X-ray diffraction (XRD), X-ray fluorescent spectroscopy (XRF), nitrogen adsorption/desorption measurements, Atomic Force Microscope (AFM) and Fourier transform infrared (FTIR) spectra, were used to characterize the calcined TiO2 nanoparticles by STAB and PWA. The TiO2 nanomaterials were prepared in three crystalline forms (amorphous, anatase, anatase-rutile). The results showed that the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show MoreGiven that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproductio
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show More