نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول على الصورة والشكل واللون، بالإضافة إلى الصعوبات مثل ضعف دقة الصورة ، الصورة الباهتة ، الإضاءة السيئة، التباين المنخفض، يجب التغلب عليها. اقترحت هذه الورقة نموذجًا باستخدام تعديل الذاكرة الترابطية ثنائية الاتجاه (MBAM)، وهي نوع واحد من الذاكرة الترابطية غير المتجانسة، وتعمل MBAM على مرحلتين)مرحلتي التعلم والتقارب) للتعرف على اللوحة، ويمكن لهذا النموذج المقترح التغلب على تلك الصعوبات بسبب قدرة الذاكرة الترابطية لـ MBAM على قبول الضوضاء وتمييز الصور المشوهة، وكذلك سرعة عملية الحساب نظرًا لصغر حجم الشبكة. نتيجة دقة تحديد منطقة اللوحة هي 99.6٪، ودقة تجزئة الأحرف 98٪، والدقة المحققة للتعرف على الأحرف هي100 ٪ في ظروف مختلفة.
This Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.
This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi
... Show MoreA research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a
... Show MoreA set newly complexes with the general formula [M(L)Cl2] are resulting from the reaction of a new schiff base ligand [Ethyl (6R,7R)-7-((E)-2-((2-ethoxy-2- oxoethoxy)imino)-2-(2-(((E)-4-nitrobenzylidene) amino) thiazol -4- yl) acetamido) -8- oxo -3- vinyl -5- thia -1-aza bicyclo [4. 2.0] oct -2- ene -2- carboxylate] (L). This ligand was derived from the reaction of the two substances 4-nitrobenzaldehyde and precursor (P). Reaction the ligand with metal ions M= Mn(II), Co(II), Ni(II), Cu(II) and Cd(II) afforded new complexes which are characterized by FT-IR and Electronic Spectra. These measurements indicate that the complexes have a tetrahedral geometry. The Penicillin-Binding Protein 3 (PBP3) of Staphylococcus aureus and the target protein
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreA new Species of the Cerambycinae belonging to the genus Hesperophanes was found new to the fauna of Iraq and Science. H. testaceus was studied in details and the male genitalia were illustrated. Type's paratypes and the locality of this newly described Species were mentioned.
ABSTRACT
This research included the preparation and characterization of new demulsifies from natural and synthetic polymers of chitosan and polyvinyl alcohol that are environmentally friendly and at the same time have high efficacy comparable to emulsifiers. imported foreign. The prepared compounds were examined using infrared spectroscopy and nuclear magnetic resonance spectroscopy, and all the spectral signals of the polymers were in good agreement with the chemical composition of the polymers. And the melting and decomposition that occur on polymers at high temperatures. The effect of the length and type of side chain in the compositions of polymers on the process of water separation of oil emulsions w
... Show More