As a result of recent developments in highway research as well as the increased use of vehicles, there has been a significant interest paid to the most current, effective, and precise Intelligent Transportation System (ITS). In the field of computer vision or digital image processing, the identification of specific objects in an image plays a crucial role in the creation of a comprehensive image. There is a challenge associated with Vehicle License Plate Recognition (VLPR) because of the variation in viewpoints, multiple formats, and non-uniform lighting conditions at the time of acquisition of the image, shape, and color, in addition, the difficulties like poor image resolution, blurry image, poor lighting, and low contrast, these must be overcome. This paper proposed a model by using Modify Bidirectional Associative Memory (MBAM), which is one type of Hetero-associative memory, MBAM works in two phases (learning and convergence phases) to recognize the number plate, and this proposed model can overcome these difficulties because MBAM's associative memory has a high ability to accept noise and distinguish distorted images, as well as the speed of the calculation process due to the small size of the network. The accuracy of plate region localization is 99.6%, the accuracy for character segmentation is 98%, and the achieved accuracy for character recognition is 100% in various circumstances
The corrosion inhibition effect of a new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) on mild steel in 1.0 M HCl was investigated using corrosion potential (ECORR) and potentiodynamic polarization. The obtained results indicated that the new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) (FSFD) has a promising inhibitive effects on the corrosion of mild steel in 1.0 M HCl across all of the conditions examined. The density functional theory (DFT) study was performed on the new furan derivative (FSFD) at the B3LYP/6-311G (d, p) basis set level to explore the relation between their inhibition efficiency and molecular electro
Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of
... Show MoreHeterocyclic compounds are crucial for medicinal chemistry and the development of therapeutic agents like broad-spectrum antibiotics. This study devised a facile procedure to synthesize novel antimicrobial bicyclic heterocycles from 2-mercapto-3-phenylquinazolin-4(3H)-one. Advanced analytical techniques including 1 H and 13C NMR, elemental analysis, and FT-IR spectroscopy characterized the intricate chemical structures of the products. In vitro assays tested the heterocycles against aerobic and anaerobic bacterial strains using fluconazole and ciprofloxacin as antifungal and antibacterial controls. Results demonstrated the formidable broad-spectrum antibacterial and antifungal activities of the synthesized compounds, with growth inhibition
... Show MoreThis study outlines the synthesis of substituted 1,2,4-triazole derivatives through the cyclization reaction of thiourea derivatives. The process begins with the reaction of different halides with KSCN to produce isothiocyanate derivatives. then followed by a reaction with isonicotinic acid hydrazide to yield thioureas (1-6), with a yield rate of (72-88%). Then, compounds (1-6) were treated with alkaline medium 4 N (NaOH) to produced 1,2,4-triazole derivatives (7-12) with a yield (51-69%).The structure of the prepared compounds was characterized using FTIR,1HNMR and 13CNMR spectroscopy. Some of the synthesized compounds were tested for antimicrobial activity when, compound 9 showed strong activity against gram positive bacteria (Sta
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show More