Preferred Language
Articles
/
-xhaLJUBVTCNdQwC_ilZ
Braille Character Recognition System: Review
...Show More Authors

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition System contains many stages, including image acquisition, pre-processing of images, and character recognition. This review aims to examine the earlier studies on transcription and Braille cell recognition by other scholars and the comparative results and detection techniques among them. This review will look at previous work done by other researchers on Braille cell recognition and transcription, comparing previous works in this study, and will be useful and illuminating for Braille Recognition System researchers, especially newcomers.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Aug 18 2018
Journal Name
Journal Of Engineering And Applied Sciences
Performance Evaluation of Transport Protocols for Mobile Ad Hoc Networks
...Show More Authors

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10

... Show More
View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
International Review Of Electrical Engineering (iree)
Enhancing Efficiency in Distribution Power Networks by Power Factor Controlling of Renewable Energy Generators: a Case Study of Iraqi Wasit Network
...Show More Authors

Integrating Renewable Energy (RE) into Distribution Power Networks (DPNs) is a choice for efficient and sustainable electricity. Controlling the power factor of these sources is one of the techniques employed to manage the power loss of the grid. Capacitor banks have been employed to control phantom power, improving voltage and reducing power losses for several decades. The voltage sag and the significant power losses in the Iraqi DPN make it good evidence to be a case study proving the efficiency enhancement by adjusting the RE power factor. Therefore, this paper studies a part of the Iraqi network in a windy and sunny region, the Badra-Zurbatya-11 kV feeder, in the Wasit governorate. A substation of hybrid RE sources is connected to this

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Acute Flaccid Paralysis Surveillance System's Structure at Al-Russafa Health Directorate in Baghdad City
...Show More Authors

Objective: evaluation of Acute Flaccid Paralysis Surveillance (AFP) System's Structure at Al-Russafa Health directorate in Baghdad City. Methodology: descriptive study using evaluation approach conducted to measure the efficiency of AFP Surveillance System structure for period from November 27th 2014 to June 30th 2015. The study adopted the non-probability multi-stage sampling approach. As nineteen health facilities under surveillance are chosen and interview is conducted with a total of 50 health worker how are involved in the AFP Surveillance System. The data are gathered from sample by using question

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.
...Show More Authors

One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.

The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.

 For data compression, where one is trying to find compact transform representations for a

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Investigation for TiO2 nanoparticles as a Lubricant-Additive for a Compressor ofWindow Type Air-Conditioner
...Show More Authors

The coefficient of performance of a window type Air-Conditioner system can be improved if a reduction in the work of compressor can be achieved by a suitable technique. The present study investigates the effect of dispersing a low concentration of TiO2 nanoparticles in the mineral oil based lubricant, as well as on the overall performance of a window type Air-Conditioner system using R22 as the working fluid. An enhancement in the COP of the refrigeration system has been observed and the existence of an optimum volume fraction noticed, with low concentrations of nanoparticles suspended in the mineral oil. Results showed that the average compressor work reduced by 13.3%, which ultimately resulted in an increase of 11.99% in the COP due to

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Detection and Diagnosis of Induction Motor Faults by Intelligent Techniques
...Show More Authors

This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and  two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Wiadomości Lekarskie
Chemo-sensory loss and FUT2 gene in COVID-19 infected Iraqi dentists
...Show More Authors

Aim: To find any association between specific ABO blood groups and FUT2 secretory status and COVID-19 in a sample of Iraqi dentists. Materials and Methods: For each participant, a questionnaire including demography, COVID-19 status, blood grouping, and RH factor, with chemo-sensitive symptoms was recorded. The saliva samples were collected and DNA was extracted from leukocytes. Sequencing of molecular detection of the FUT2 gene by real-time PCR and the data was done, whilst drawing the phylogenetic tree. Results: Out of 133, most of the dentists were female 61%, most were just under 35 years of age. The most participants in this study were predominantly with blood group O (40%), followed by B, A, and AB, with (90%) of them were RH+.

... Show More
View Publication Preview PDF
Scopus Crossref