In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to recognize and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully identified and recognized multi_style Iraqi license plates using different image situations and it was evaluated based on different metrics performance, achieving an overall system performance of 91.99%. This results shows the effectiveness of the proposed method compared with other existing methods, whose average recognition rate is 86% and the average processing time of one image is 0.242s which proves the practicality of the proposed method.
Values are penetrating or interfering in the lives of individuals and groups and are connected to them in the sense of life itself, because they are closely linked to the motives of behavior, hopes and goals, and can be said that values are everything. The concept of values is one of the concepts that have received the attention of researchers from different disciplines. This has resulted in a kind of confusion and variation in use from one specialization to the other, and uses multiple uses within one specialization. Therefore, there is no uniform definition of values because they relate to individuals. Individuals differ in many things, such as perception,
... Show MoreThis study explains the effect of non-thermal (cold) plasma on wound of diabetic rats by (FE-DBD) system, 3cm probe diameter is used. The output power was ranged from (12-20) W. The effect of non-thermal plasma on wounds of a diabetic was observed with different exposure durations (20,30) sec., the plasma exposure duration decreases the sugar level in blood and the diameter of the wound. These results indicate the cold plasma can be used to enhance the insulin level (i.e., blood sugar) and wounds treatment.
The current, research, aims, to, verify, the relationship between talent development practices and organizational performance through a mediating role of creative organizational climate at the Institution of Industrial Development and Research- the Iraqi Industry Ministry. The descriptive and analytic approach was adopted as a research design. The research sample was represented by a number of managers and employees who work at the middle management level. The researchers used the questionnaire as the main method for collecting data to achieve the main research objective. It was distributed 162 questionnaires, of which 146 received; and then all of those were used on the final statistical analysis. The sample response-rate rate w
... Show MoreOur country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.
The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.
Aims:
The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show MoreGrabisch and Labreuche have recently proposed a generalization of capacities, called the bi-capacities. Recently, a new approach for studying bi-capacities through introducing a notion of ternary-element sets proposed by the author. In this paper, we propose many results such as bipolar Mobius transform, importance index, and interaction index of bi-capacities based on our approach.
In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show More