نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول على الصورة والشكل واللون، بالإضافة إلى الصعوبات مثل ضعف دقة الصورة ، الصورة الباهتة ، الإضاءة السيئة، التباين المنخفض، يجب التغلب عليها. اقترحت هذه الورقة نموذجًا باستخدام تعديل الذاكرة الترابطية ثنائية الاتجاه (MBAM)، وهي نوع واحد من الذاكرة الترابطية غير المتجانسة، وتعمل MBAM على مرحلتين)مرحلتي التعلم والتقارب) للتعرف على اللوحة، ويمكن لهذا النموذج المقترح التغلب على تلك الصعوبات بسبب قدرة الذاكرة الترابطية لـ MBAM على قبول الضوضاء وتمييز الصور المشوهة، وكذلك سرعة عملية الحساب نظرًا لصغر حجم الشبكة. نتيجة دقة تحديد منطقة اللوحة هي 99.6٪، ودقة تجزئة الأحرف 98٪، والدقة المحققة للتعرف على الأحرف هي100 ٪ في ظروف مختلفة.
TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using
... Show MoreIn this study, the dung beetles Aphodius (Bodilus) ictericus (Laicharting, 1781) and Aphodius (Planolinellus) vittatus Say, 1825 which belongs to the family of Aphodiidae (Order: Coleoptera) are redscribed here as to being found for the first time in Iraq.
The specimens were collected from different regions in the middle of Iraq; the main diagnostic characters and some morphological features of males were drawn and pictured.
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreA particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
Each of the countries that make up the international community and active in international and regional relations has specific elements and tools. Their roles differ according to those components and tools. There are countries that play an effective and effective international role, while others play an effective and effective regional role. The international or regional role in order to be effective and influential must be based on a set of conditions that will give it a degree of credibility and achieve the objectives of the role. The state affects the decisions of other countries because of its ability, and the ability of the state to influence is not limited to military power only, but political, economic, demographic, technical, geo
... Show MoreSome new complexes of 4-(5-(1,5-dimethyl-3-oxo-2-phenyl pyrazolidin-4- ylimino)-3,3-dimethyl cyclohexylideneamino) -1,5- dimethyl-2- phenyl -1H- pyrazol -3(2H) –one (L) with Mn(II), Fe(III), Co(II), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) were prepared. The ligand and its metal complexes were characterized by phisco- chemical spectroscopic techniques. The spectral data were suggested that the (L) as a neutral tetradentate ligand is coordinated with the metal ions through two nitrogen and two oxygen atoms. These studies revealed Octahedral geometries for all metal complexes, except square planar for Pd(II) complex. Moreover, the thermodynamic activation parameters, such as ?E*, ?H, ?S, ?G and K are calculated from the TGA curves using Coa
... Show MoreAbstract:
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More