Preferred Language
Articles
/
bsj-3494
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

            In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to identify and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully detects LP and recognizes multi-style Arabic characters with rates of 96% and 97.872% respectively under different conditions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
DIFICULTADES DE TRADUCCIÓN DE LOS TEXTOS JURÍDICOS DEL ESPAÑOL AL ÁRABE DIFFICULTIES OF TRANSLATION OF LEGAL TEXTS IN SPANISH ARABIC
...Show More Authors

Resumen:

 El presente trabajo intenta analizar las características del lenguaje jurídico español a cuya estructura se debe su complejidad. A la vez, damos una descripción detallada de sus rasgos morfosintácticos, léxico-semánticos y estilísticos. En ningún momento, pretendemos fijar unas pautas o normas para la traducción de este lenguaje que requiere unos previos conocimientos jurídicos y cierta preparación para proceder a realizar esta tarea. Nuestra intención es, simplemente, ofrecer al lector árabe una pequeña visión de lo difícil que es comprender los textos legales españoles hasta para los nativos para imaginarse las posibles dificultades a la hora de iniciar a traducirlos.

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Das literarische Bild und die sprachliche Struktur der Sprichwörter bei der gegenseitigen Übersetzung im Deutschen und Arabischen The literary image in the translation of the German and Arabic proverbs
...Show More Authors

Vorwort:

                              Die Übersetzung gilt in der Vergangenheit als Brücke zwischen  verschiedenen Gesellschaften. Sie spielt eine große Rolle im Bereich Kulturaustausch der Länder. Die Araber haben das früh betrachtet, und die Übersetzung als Wissenschaft wird eine der wichtigsten Lehren. Viele griechische Wissenschaften waren durch Übersetzung in den arabischen Ländern bekannt.

In dieser Forschung findet man einen Überblick über die Wichtigkeit der Sprichwörterübersetzung und welche Rolle spielt diese Übersetzung im Z

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 31 2013
Journal Name
Inventi Impact: Artificial Intelligence
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett

... Show More
View Publication
Publication Date
Tue Jul 01 2014
Journal Name
Ieee Transactions On Circuits And Systems I: Regular Papers
Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip
...Show More Authors

Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o

... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Impact of Mind and Informational Strategy on the ‎Achievement of the Second Intermediate Students in the Grammar ‎of Arabic Language
...Show More Authors

The aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the Observing Internal System in the General State of Taxes and its Role in Increasing the Taxes Revenue
...Show More Authors

The internal observing system is considered a cornerstone for the high management in all the systems. It aims at defending the things for waste and increasing efficient and application the rules and regulations and constrictions. To easier for the high management activity in the internal observing system which in presented and practiced and to what extent can depend on it. Thus it goes to evaluate the internal observing system periodically to check the weak points in that system so as the find out the mistake, in the construction of the system or mistake, by indication of the workers. The importance of this study is represented in the need of increasing the coactivity in the internal observing system so as to be in touch with the new tre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref