The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition System contains many stages, including image acquisition, pre-processing of images, and character recognition. This review aims to examine the earlier studies on transcription and Braille cell recognition by other scholars and the comparative results and detection techniques among them. This review will look at previous work done by other researchers on Braille cell recognition and transcription, comparing previous works in this study, and will be useful and illuminating for Braille Recognition System researchers, especially newcomers.
The inflammatory response is a crucial aspect of the tissues’ responses to deleterious inflammogens. This complex response involves leukocytes cells such as macrophages, neutrophils, and lymphocytes, also known as inflammatory cells. In response to the inflammatory process, these cells release specialized substances which include vasoactive amines and peptides, eicosanoids, proinflammatory cytokines, and acute-phase proteins, which mediate the inflammatory process by preventing further tissue damage and ultimately resulting in healing and restoration of tissue function. This review discusses the role of the inflammatory cells as well as their by-products in the mediation of inflammatory process. A brief insight into the role of natural an
... Show MoreIntroduction: All-ceramic crowns are widely used in prosthodontics and cosmetic dentistry due to their good esthetic and proper physical properties. Chipping of ceramic is one of the most common post-insertion complications, that can be fixed either extraoral or intraorally. The latter is time time-effective alternative, less traumatic, and low-cost. A newer objective method of laser is a surface modification of ceramics to increase surface roughness. The aim of this study is to provide a review of Er,Cr;YSGG (2960nm) in intraoral repair and shear bond strength (SBS). Method: A thorough search considering Google Scholar and PubMed published data and ten articles found wh
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MoreUltraviolet photodetectors have been widely utilized in several applications, such as advanced communication, ozone sensing, air purification, flame detection, etc. Gallium nitride and its compound semiconductors have been promising candidates in photodetection applications. Unlike polar gallium nitride-based optoelectronics, non-polar gallium nitride-based optoelectronics have gained huge attention due to the piezoelectric and spontaneous polarization effect–induced quantum confined-stark effect being eliminated. In turn, non-polar gallium nitride-based photodetectors portray higher efficiency and faster response compared to the polar growth direction. To date, however, a systematic literature review of non-polar gallium nitride-
... Show MoreThe study evaluated the recovery performance of any home herbs group as first aid in some emergency cases. The study involved 10 items of herbs (chamomile, black pepper, cloves, cinnamon, and anise) which used in acute cases such as cold, colic, inflammation of the intestine and tonsillitis, and (hibiscus, catnip, dried lime, cress seed, and ginger) were used for chronic cases such as hypertension, cardiovascular disease, and arthritis. The results showed the herbs had healing power and efficiency in the primary remedy for the above-mentioned diseases. The side effects, the contradictions, and the overdoses of these substances were discussed. It was concluded that home herbs could be used for treatment in emergency cases until moder
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreSecure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In this paper it is required to enhance the performance of a mechanical system (here: a Hoisting System) where it is preferred to lift a different payloads with approximately the same speed of lifting and keeping at the same time the good performance, and this of course needs some intelligence of the system which will be responsible on measuring the present load and taking into account the speed and performance desired in order to achieve the requirements or the criteria. The process therefore is a Mechatronics System design which includes a measuring system, a control or automation technique, and an actuating system. The criteria built here in this research using a given Hoist system's characteristics and parameters and changing one of
... Show More