Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically rather than a long time consuming manually gathering for the information. In this article, transfer learning is employed to train two distinct YOLOv8 models for enhanced automatic number plate recognition (ANPR). This approach leverages the strengths of YOLOv8 in handling complex patterns and variations in license plate designs, showcasing significant promise for real-world applications in vehicle identification and law enforcement.
The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreAromatic hydrocarbons present in Iraqi national surface water were believed to be raised principally from combustion of various petroleum products, industrial processes and transport output and their precipitation on surface water.
Polycyclic aromatic hydrocarbons (PAHs) were included in the priority pollutant list due to their toxic and carcinogenic nature. The concern about water contamination and the consequent human exposure have encouraged the development of new methods for
PAHs detection and removal.
PAHs, the real contaminants of petroleum matter, were detected in selected sites along Tigris River within Baghdad City in summer and winter time, using Shimadzu high performance liquid chromatography (HPLC) system.
Analysi
The association of phytoplasma was investigated in symptomatic tomato (
P. aeruginosa is one of the complex targets for antimicrobial chemotherapy. Also, it is intrinsically resistant to several antibiotics. It produces β-lactamases enzymes that are responsible for the widespread β-lactam antimicrobial resistance. There are three major groups of β-lactamase enzymes, MBLs and ESBLs forming Pseudomonas is a major issue for the treatment of burns victims. Methods: A total of 28 clinical isolates related to P. aeruginosa have been obtained from the burns specimens from patients attending to AL-Imam hospital/Baghdad-Iraq, through the period from October 2015 to March 2016. Also, all isolates have been recognized as P. aeruginosa via utilizing bacteriological assay and confirmed by Vitek 2. In addition, the suscep
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show MoreThis study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate perse
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More