34 research outputs found

    Threshold adaptation and XOR accumulation algorithm for objects detection

    Get PDF
    Object detection, tracking and video analysis are vital and energetic tasks for intelligent video surveillance systems and computer vision applications. Object detection based on background modelling is a major technique used in dynamically objects extraction over video streams. This paper presents the threshold adaptation and XOR accumulation (TAXA) algorithm in three systematic stages throughout video sequences. First, the continuous calculation, updating and elimination of noisy background details with hybrid statistical techniques. Second, thresholds are calculated with an effective mean and gaussian for the detection of the pixels of the objects. The third is a novel step in making decisions by using XOR-accumulation to extract pixels of the objects from the thresholds accurately. Each stage was presented with practical representations and theoretical explanations. On high resolution video which has difficult scenes and lighting conditions, the proposed algorithm was used and tested. As a result, with a precision average of 0.90% memory uses of 6.56% and the use of CPU 20% as well as time performance, the result excellent overall superior to all the major used foreground object extraction algorithms. As a conclusion, in comparison to other popular OpenCV methods the proposed TAXA algorithm has excellent detection ability

    Effective Web Page Crawler

    Get PDF
    The World Wide Web (WWW) has grown from a few thousand pages in 1993 to more than eight billion pages at present. Due to this explosion in size, web search engines are becoming increasingly important as the primary means of locating relevant information. This research aims to build a crawler that crawls the most important web pages, a crawling system has been built which consists of three main techniques. The first is Best-First Technique which is used to select the most important page. The second is Distributed Crawling Technique which based on UbiCrawler. It is used to distribute the URLs of the selected web pages to several machines. And the third is Duplicated Pages Detecting Technique by using a proposed document fingerprint algorithm

    Practical application of IOT and its implications on the existing software

    Get PDF
    The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis

    Assessment of the knowledge, attitude, and practice related to visceral leishmaniasis among residents of Al-Suwaira city, Wasit Governorate, Middle East of Iraq

    Get PDF
    Introduction: It is important to assess the knowledge, attitudes, and practice (KAP) towards visceral leishmaniasis (VL) to implement an effective control program. Hence, this study aimed to shed light in KAP among residents at Al-Suwaira city, Wasit Governorate, Middle East of Iraq. Methods: During March to May 2021, a cross-sectional study was done on 121 randomly selected residents. A normal self-administered questionnaire was used to measure the KAP. The results were expressed using descriptive analysis. Results: Overall, participants indicated average knowledge towards VL. However, the incubation period of VL (23.9%), the symptoms of VL (57.9%), and the diseases' transmission ways (54.5%) were recognized as knowledge gaps. The participants had favorable attitude towards VL, as majority of them (more than 70.0%) agreed that VL causes health problems in the local populations and local communities should be actively involved in the fight against VL. Also, majority of the participants agreed that VL is a treatable. Regarding practice towards VL, 110 (90.9%) participants had used preventive measures against sand fly bites. The majority of people (44.6%) chose cleanliness as a disease-prevention technique. The main sources of information used by participants to educate themselves about the condition were the internet (57.0%) and television (19.8%). Conclusion: Overall, the participants had good knowledge, positive attitudes, and good practice when it came to VL prevention. However, there were some gaps. Hence, it is recommended that knowledge-based strategies be strengthened and rigorously rolled out in order to raise awareness among the residents of the region

    A New Approach for Hiding Image Based on the Signature of Coeficients

    Get PDF
    This paper presents a new approach for hiding the secret image inside another image file, depending on the signature of coefficients. The proposed system consists of two general stages. The first one is the hiding stage which consist of the following steps (Read the cover image and message image, Block collections using the chain code and similarity measure, Apply DCT Transform, Signature of coefficients, Hiding algorithm , Save information of block in boundary, Reconstruct block to stego image and checking process). The second stage is extraction stage which consist of the following steps ( read the stego image, Extract information of block from boundary, Block collection, Apply DCT transform, Extract bits of message and save it to buffer, Extracting message)

    Numerical Solution of Linear Delay Fredholm Integral Equations by using Homotopy Perturbation Method

    Get PDF
    The main purpose of this work is to propose the Homotopy perturbation method for solving first type Linear Delay Fredholm Integral Equations (LDFIE).A Comparison between the numerical solution and exact solution has been made depending on least squares errors. Results are presented in tables and figures. efficient and accuracy are appeared in applying of this the proposed method

    Predictive Learning Analytics in Higher Education: Factors, Methods and Challenges

    Get PDF
    In higher education institutions, a high number of studies show that the use of predictive learning analytics can positively impact student retention and the other aspects which lead to student success. Predictive learning analytics examines the learning data for intervening or improving the process itself that positively reflects on student performance. In our survey, we are considering the most recent research papers focusing on predictive learning analytics and how that affects the final student outcome in educational institutions. The process of predictive learning analytics, such as data collection, data preprocessing, data mining, and others, has been illustrated in detail. We have identified factors that affect student performance. Several machine learning approaches have also been compared to provide a clear view of the most suitable algorithms and tools used for implementing the learning analytic

    Molecular epidemiology, genetic diversity, and vaccine availability of viral acute gastroenteritis in the middle East and North Africa (MENA) region

    Get PDF
    Acute gastroenteritis is the cause of considerable mortality and morbidity worldwide, particularly among children under five years in underdeveloped countries. Most acute gastroenteritis (AGE) cases are attributed to viral etiologies, including rotavirus, norovirus, adenovirus, astrovirus, and sapovirus. This paper aimed to determine the prevalence rate of different viral etiologies of AGE in the Middle East and North Africa (MENA) region. Moreover, this paper explored rotavirus phylogenetic relatedness, compared VP7 and VP4 antigenic regions of rotavirus with vaccine strains, and explored the availability of vaccines in the MENA region. The literature search identified 160 studies from 18 countries from 1980 to 2019. The overall prevalence of rotavirus, norovirus, adenovirus, astrovirus, and sapovirus were 29.8 %, 13.9 %, 6.3 %, 3.5 %, and 3.2 % of tested samples, respectively. The most common rotavirus genotype combinations in the MENA region were G1P[8], G9P[9], and G2P[4], whereas GII.4 was the predominant norovirus genotype all of which were reported in almost all the studies with genotyping data. The comparison of VP7 and VP4 between circulating rotavirus in the MENA region and vaccine strains has revealed discrete divergent regions, including the neutralizing epitopes. Rotavirus vaccine was introduced to most of the countries of the MENA region; however, only a few studies have assessed the effectiveness of vaccine introduction. This paper provides a comprehensive update on the prevalence of the different viral agents of AGE in the MENA region.Open Access funding provided by the Qatar National Library (QNL)
    corecore