This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with template standard numbers and letters used in the Iraqi plate. The system was implemented using Matlab (R2012a) and shows accurate performance results reached 93.33%
Natural frequency under initial stresses for simply supported cross-ply composite laminated plates (E glass- fiber) are obtained using Refind theory (RPT). This theory accounts for parabolic distribution of the transverse shear strain through the plate thickness and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factors. The governing equations for Eigen value problem under initial stress are derived using Hamilton’s principle and solved using Navier solution for simply supported cross-ply symmetric and antisymmetric laminated plates. The effect of many design factors such as modulus ratio, thickness ratio and number of laminates on the Natural frequency and buckling stresses
... Show MoreThe researchers reached many conclusions, the most important of which was the distinction of practitioners of sports activity with high degrees in the trait (social). At the same time, it was low in the trait (aggression –restraint-desisting) and non-practitioners were distinguished by sports activity with high degrees in the trait (aggression –restraint-desisting). In contrast, the degree was low in the trait (social), and there were significant differences in favor of practitioners of the activity of the athlete, Through the conclusions, the researchers recommend the need for university students to practice sports activities because of their positive impact on their health in general and on the deve
... Show MoreIn this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).
The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreMishrif Formation is the main reservoir in Amara Oil Field. It is divided into three units (MA, TZ1, and MB12). Geological model is important to build reservoir model that was built by Petrel -2009. FZI method was used to determine relationship between porosity and permeability for core data and permeability values for the uncored interval for Mishrif formation. A reservoir simulation model was adopted in this study using Eclipse 100. In this model, production history matching executed by production data for (AM1, AM4) wells since 2001 to 2015. Four different prediction cases have been suggested in the future performance of Mishrif reservoir for ten years extending from June 2015 to June 2025. The comparison has been mad
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe personality of the hero Salah al-Din al-Ayyubi (may God have mercy on him) came from the womb of jihad after difficult travails that the Arab Islamic nation experienced through the jihad of its loyal and honest sons who vowed themselves to God in defense of his religion and law, so between 490 AH - 540 AH outstanding jihadi leaders emerged who took upon themselves the responsibility of jihad and mobilizing the nation's energies To fight its enemies - the Franks, the Crusaders - in the Levant, and those leaders succeeded in achieving impressive victories over the Frankish military effort and regained some cities that were usurped by the Franks. Balak bin Bahram, Suqman, and Jakarmish, but these leaders could not maintain a state of un
... Show MoreThe present study focused mainly on the analysis of stiffened and unstiffened composite laminated plates subjected to buckling load. Analytical, numerical and experimental analysis for different cases has been considered. The experimental investigation is to manufacture the laminates and to find mechanical properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus. The compressive test was carried to find the critical buckling load of plate. The design parameters of the laminates such as aspect ratio, thickness ratio, boundary conditions and number of stiffeners were investigated using high order shear deformation theory (HOST) and Finite element coded by ANSYS .The main conclusion was the buckling load c
... Show More