In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to identify and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully detects LP and recognizes multi-style Arabic characters with rates of 96% and 97.872% respectively under different conditions.
Censure in poetry is a pattern of poetic construction, in which the poet evokes a voice other than his own voice or creates out of his own self another self and engages with him in dialogue in the traditional artistic style whose origin remains unknown. Example of the same may be found in the classical Arabic poets’ stopping over the ruins, crying over separation and departure and speaking with stones and andirons; all in the traditional technical mould. Censure confronting the poet usually emanates from the women as blaming, censure and cursing is closer to woman’s hearts than to the man’ hearts. Censure revolves around some social issues, such as the habit of over drinking wine and extravagant generosity taking risks, traveling,
... Show MoreResumen The article deals with the analysis of different ways of creating Arabic scientific terminology. Arabic scientific style includes the terminology that represents different scientific areas functioning in all Arabic countries. These ways can be classified as: giving the meaning of terms; construction of new terms according to the rules of word formation; reduction and ellipsis of terms; direct term borrowing, all the above-mentioned being subject to further analysis. Main objectives of academic style, the specific features and certain lexical and grammatical peculiarities of the Arabic scientific terminology are under consideration as well. Discussed in the paper are linguistic and extra-linguistic factors influencing the ways of sci
... Show More
Abstract of the research:
This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that It should be undertaken and studied by researchers; Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic. In the
... Show MoreSpelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject
... Show MoreProviding stress of poetry on the syllable-, the foot-, and the phonological word- levels is one of the essential objectives of Metrical Phonology Theory. The subsumed number and types of syllables, feet, and meters are steady in poetry compared to other literary texts that is why its analysis demonstrates one of the most outstanding and debatable metrical issues. The roots of Metrical Phonology Theory are derived from prosody which studies poetic meters and versification. In Arabic, the starting point of metrical analysis is prosodic analysis which can be attributed to يديهارفلا in the second half of the eighth century (A.D.). This study aims at pinpointing the values of two metrical parameters in modern Arabic poetry. To
... Show MoreThe simulation have been made for 3D flow structure and heat transfer with and without
longitudinal riblet upstream of leading edge vane endwall junction of first stage nozzle guide vane .The research explores concept of weakening the secondary flows and reducing their harmful effects.Numerical investigation involved examination of the secondary flows ,velocity and heat transfer rates by solving the governing equations (continuity, Navier -stokes and energy equations ) using the known package FLUENT version (12.1).The governing equations were solved for three dimentional, turbulent flowe, incompressible with an appropriate turbulent model (k-ω,SST) .The numerical solution was carried out for 25 mode
... Show MoreThe effect of three ionic liquids viz., 1-hexyl-3-methylimidazolium tetrafluoroborate (ILE), 1-hexyl-3-metylimidazolium hexafluorophosphate (ILF) and 1-octyl-3-methylimidazolium tetrafluoroborate (ILG) when used as surfactants on the performance of dissolved air floatation (DAF) was investigated.
Experiments were conducted at a temperature of 30-35 ºC, 10ppm ferric chloride as coagulant, 50% recycle ratio, pH 8, and 10 minutes treatment time to find oil and grease (OG) and turbidity removal efficiencies at saturation pressure (2-6) bar.
ILs were used at concentration of 50 µl/liter of treated water in two positions in DAF system; the saturation vessel and the treatment tank. The performance using ILs
... Show MoreUpper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin
... Show MoreAnumerical solutions is presented to investigate the effect of inclination angle (θ) , perforation ratio (m) and wall temperature of the plate (Tw) on the heat transfer in natural convection from isothermal square flat plate up surface heated (with and without concentrated hole). The flat plate with dimensions of (128 mm) length × (64 mm) width has been used five with square models of the flat plate that gave a rectangular perforation of (m=0.03, 0.06, 0.13, 0.25, 0.5). The values of angle of inclination were (0o, 15o 30o 45o 60o) from horizontal position and the values of wall temperature (50oC, 60 oC, 70 oC, 90 oC, 100o<
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More