Preferred Language
Articles
/
hRf60I0BVTCNdQwCLh0Q
Hetero-associative Memory Based New Iraqi License Plate Recognition
...Show More Authors

As a result of recent developments in highway research as well as the increased use of vehicles, there has been a significant interest paid to the most current, effective, and precise Intelligent Transportation System (ITS). In the field of computer vision or digital image processing, the identification of specific objects in an image plays a crucial role in the creation of a comprehensive image. There is a challenge associated with Vehicle License Plate Recognition (VLPR) because of the variation in viewpoints, multiple formats, and non-uniform lighting conditions at the time of acquisition of the image, shape, and color, in addition, the difficulties like poor image resolution, blurry image, poor lighting, and low contrast, these must be overcome. This paper proposed a model by using Modify Bidirectional Associative Memory (MBAM), which is one type of Hetero-associative memory, MBAM works in two phases (learning and convergence phases) to recognize the number plate, and this proposed model can overcome these difficulties because MBAM's associative memory has a high ability to accept noise and distinguish distorted images, as well as the speed of the calculation process due to the small size of the network. The accuracy of plate region localization is 99.6%, the accuracy for character segmentation is 98%, and the achieved accuracy for character recognition is 100% in various circumstances

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (40)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (40)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Performance Analysis of Four Conceptual Designs for the Air Based Photovoltaic / Thermal Collectors
...Show More Authors

The  thermal  and  electrical  performance  of  different  designs  of  air  based  hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Engineering
Demulsification of Water in Iraqi Crude Oil Emulsion
...Show More Authors

Formation of emulsions during oil production is a costly problem, and decreased water content in emulsions leads to increases productivity and reduces the potential for pipeline corrosion and equipment used. The chemical demulsification process of crude oil emulsions is one of the methods used for reducing water content. The demulsifier presence causes the film layer between water droplets and the crude oil emulsion that to become unstable, leading to the accelerated of water coalescence. This research was performed to study the performance of a chemical demulsifier Chimec2439 (commercial) a blend of non-ionic oil-soluble surfactants. The crude oils used in these experiments were Basrah and Kirkuk Iraqi crude oil. These

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Aug 16 2016
Journal Name
Case Studies In Surgery
Ameloblastoma: A clinical study of 25 Iraqi patients
...Show More Authors

Objective: Geographic differences in clinical and pathological aspects of ameloblastoma have been suggested, therefore the purpose of this study was to analyze cases of ameloblastoma in terms of clinical and radiographic manifestations, histopathological types, treatment modalities and recurrence rate and compare them with reports from other parts of the world. Methods: The medical reports of patients diagnosed with ameloblastoma were reviewed and the data concerning the age, gender, chief complaint, the anatomical site of the lesion, radiographic appearance, histopathological diagnosis, treatment approach and recurrence were retrieved. Surgical treatment consisted of either enucleation with curettage and peripheral ostectomy or resection;

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
دراسات في التاريخ والاثار
unpublished cuneiform texts from the Iraqi Museum (confiscation)
...Show More Authors

The research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.