Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically rather than a long time consuming manually gathering for the information. In this article, transfer learning is employed to train two distinct YOLOv8 models for enhanced automatic number plate recognition (ANPR). This approach leverages the strengths of YOLOv8 in handling complex patterns and variations in license plate designs, showcasing significant promise for real-world applications in vehicle identification and law enforcement.
Abstract
This study concerned of scientific analysis of sociological directions
among Iraqi scholars graduated before 1960. These directions was divided
between heritage, conflict, critical and symbolic interaction. It is important to
mention that Al-Wardi scholar tried to build a theory in Sociology focused on
the image of Iraqi personality through historical approach used by Arabian
scholar Ibn-Khaldon.
This study examines patterns of exposure of Iraqi university students to selective daily Iraqi newspapers and the motives of this exposure, as well as its associated factors that affect the average exposure. It tries to answer several questions, including those related to the levels of exposure of Iraqi university students to daily Iraqi newspapers and classification of patterns of selective exposure to daily Iraqi newspapers and the most prominent Iraqi daily newspapers that are selectively exposed by Iraqi university students. It also examines the motives of this selective exposure and factors that increase the degree of exposure to the daily Iraqi newspapers, and the most prominent stages in which Iraqi university students find their
... Show MoreA total of 165 clinical sample included Urine, Swab wounds and Burns were collected from Baghdad Governorate. Results showed that rate all isolates of E. coli was 50(30.3%) and rate of urine infection was 46(92%) and rate of swab wounds infection 4(8%). Where was diagnostic based on streaked on MacConkey agar, then single colony was transferred to Eosin Methylene Blue (EMB). Identification some of the biochemical test included: Catalase test, Oxidase test, Indole test, Methyl red, Vogues - Proskauer test and Citrate Utilization test. Then confirmed by the Vitek - 2 Compact System. The ability of E.coli isolate to biofilm formation to be studied it is considered one of the most important factors of virulence and has role in causing injury an
... Show MoreOsteoporosis (OP) is a systemic skeletal disorder that is characterized by reduced bone mass and micro-architectural deterioration of bone tissue, with a consequent increase in bone fragility and susceptibility to fracture. The most frequent osteoporotic fractures are fractures of the hip, wrist, and spine. The exact causes of OP are still unknown; several factors contribute to the disorder. Subjects and Methods: This study consists of patient groups, this group (Group A) was composed of 80 postmenopausal women with OP and osteopenia and the patient group was subdivided into two group; First group (GroupA1) was composed of 50 postmenopausal women with OP and the second group (Group A2) composed of (30) Postmenopausal Women with oste
... Show MoreA load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
This study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More