In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to identify and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully detects LP and recognizes multi-style Arabic characters with rates of 96% and 97.872% respectively under different conditions
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreIntroduction The abortions reasons in several circumstances yet are mysterious, nevertheless the bacterial toxicities signify a main reason in abortion, where germs seems to be the utmost elaborate pathogens (Khameneh et.al., 2014) and (Oliver and Overton ,2014). Between numerous germs, Humano
Background: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amni
... Show MoreThis research seeks to identify the dimensions of the development of staff performance (training ', incentives, management skills) and its impact on the settlement of compensatory claims adopted in the current research in the Iraqi insurance company،This research aims to highlight the role of developing insurance company’s workers’ performance in settling insurance compensation, and to check this process, the research was applied in the general Iraqi insurance company as it considered as the research community, and a sample was taken from this community that represented by company’s insurance department workers or by collecting actual data that is related to the research’s sample, in addition to the financial compensation data.<
... Show MoreO estudo destaca a necessidade crítica de se focar nas capacidades físicas, motoras e técnicas das jogadoras de esgrima, desenvolvendo e testando metodologias de treino modernas, baseadas na ciência, adaptadas às exigências específicas do desporto. O objetivo do estudo foi avaliar a eficácia do treino tridimensional visando melhorar as capacidades motoras e o desempenho técnico dos participantes. Recorrendo a um desenho experimental, o estudo envolveu a formação de grupos experimentais e de controlo. A amostra incluiu 16 esgrimistas da Faculdade Feminina de Educação Física e Ciências do Desporto. Após a exclusão de dois jogadores durante a fase exploratória, os restantes 14 foram divididos igualmente em grupos experimental
... Show More