Preferred Language
Articles
/
TBayBYcBVTCNdQwCDy-F
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to identify and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully detects LP and recognizes multi-style Arabic characters with rates of 96% and 97.872% respectively under different conditions

Publication Date
Sat Jan 02 2021
Journal Name
International Journal Of Pharmaceutical Research
Detection of Kaposi’s Associated Herpesvirus in Saliva of Drug Related Immunosupressed Patient
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Producing Coordinate Time Series for Iraq's CORS Site for Detection Geophysical Phenomena
...Show More Authors

Global Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.

In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Mon Dec 02 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability
Effect of thickness variation CdO/PSi thin films on detection of radiation
...Show More Authors

CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f

... Show More
Scopus (2)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Tropical Journal Of Natural Product Research
Detection of Herpes Simplex Virus Type 1 in Patients Affected by Conjunctivitis
...Show More Authors

Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Apr 19 2010
Journal Name
Computer And Information Science
Quantitative Detection of Left Ventricular Wall Motion Abnormality by Two-Dimensional Echocardiography
...Show More Authors

Echocardiography is a widely used imaging technique to examine various cardiac functions, especially to detect the left ventricular wall motion abnormality. Unfortunately the quality of echocardiograph images and complexities of underlying motion captured, makes it difficult for an in-experienced physicians/ radiologist to describe the motion abnormalities in a crisp way, leading to possible errors in diagnosis. In this study, we present a method to analyze left ventricular wall motion, by using optical flow to estimate velocities of the left ventricular wall segments and find relation between these segments motion. The proposed method will be able to present real clinical help to verify the left ventricular wall motion diagnosis.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Mar 19 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Molecular Detection of Acientobacter Baumannii Isolated From Nosocomial Infections in Baghdad Hospitals
...Show More Authors

 The present study is an attempt for detection of A. baumannii by conventional and PCR methods using species-specific primers for these A. baumannii. A total of 87 samples were collected from hospitals in Baghdad (Al-Rasafa and Al-Karkh Hospitals) during the period from 2019 to 2020.The samples included: 40 specimens, from wounds, respiratory infections (sputum), burns, CSF and 47 samples from the hospital environment (swabs), while samples collected from intensive care unit including patient beds, surgical instruments and appliances, emergency lobby and baby incubators. A. baumannii isolate identification depending on the morphologic characteristics on the culture media including, blood agar, MacConkey  agar, as well as t

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
The Iraqi Journal Of Veterinary Medicine
Haemoglobin Epsilon as a Biomarker for the Molecular Detection of Canine ‎Lymphoma
...Show More Authors

Lymphoma is a cancer arising from B or T lymphocytes that are central immune system ‎components. It is one of the three most common cancers encountered in the canine; ‎lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, ‎such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of ‎canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still ‎crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic ‎conditions and to improve decision-making around treating and what treatment type to use. ‎This study aimed to evaluate a potential novel biomarker related to iron metabolism,

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref