نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول على الصورة والشكل واللون، بالإضافة إلى الصعوبات مثل ضعف دقة الصورة ، الصورة الباهتة ، الإضاءة السيئة، التباين المنخفض، يجب التغلب عليها. اقترحت هذه الورقة نموذجًا باستخدام تعديل الذاكرة الترابطية ثنائية الاتجاه (MBAM)، وهي نوع واحد من الذاكرة الترابطية غير المتجانسة، وتعمل MBAM على مرحلتين)مرحلتي التعلم والتقارب) للتعرف على اللوحة، ويمكن لهذا النموذج المقترح التغلب على تلك الصعوبات بسبب قدرة الذاكرة الترابطية لـ MBAM على قبول الضوضاء وتمييز الصور المشوهة، وكذلك سرعة عملية الحساب نظرًا لصغر حجم الشبكة. نتيجة دقة تحديد منطقة اللوحة هي 99.6٪، ودقة تجزئة الأحرف 98٪، والدقة المحققة للتعرف على الأحرف هي100 ٪ في ظروف مختلفة.
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIraqi-Saudi Relations have witnessed a state of rapprochement over decades. However, this rapprochement was temporary and could not overcome the differences that formed the core of Iraqi-Saudi relations after 2003, relations between Iraq and Saudi Arabia deteriorated with the Iraqi governments that followed the rule of Iraq after 2003, especially the government of Nuri Al-Maliki in which relations reached the end of mutual accusations between the two parties. In order to promote the relationship between the two countries, a culture of moderation has to be propagated especially in the field of religion and the religious institution should be encouraged to open up to other sects and to recognize all sects as prelude to combating the cultur
... Show MoreThe pioneer contributions included a sign for Iraqi Bryoflora were those of (Juratzka &
Milde) and Schiffner published at the end of the 19th century i.e. (1870 & 1897) respectively.
However, throughout the whole next century, the 20th, only few papers, by different authors,
have been published separately. They are Schiffner (1913); Handel-Mazzetti (1914); Froelich
(1959); Vondracek (1962 & 1965); Agnew &Townsend (1970); Agnew ( 1973 ) ; Agnew&
Vondracek (1975); Long (1979); Al-Ni’ma (1994). The most comprehensive work among
them was the “Moss Flora of Iraq” by Agnew & Vondracek (1975). It included a description
of 54 genera and 145 species with an identification key in addition to notes
The current research (violence in contemporary Iraqi drawing) study the nature of the manifestations of violence, Kdoual effective in technical text and give these functions of the images have multiple connotations psychological symbolism, and has read the text in the light of the impact of the Iraqi social reality after the recent occupation of events and to study the impact of this stage on Iraqi contemporary painting, and this research consists of three chapters included the first chapter defines the research problem, which is illustrated through the following questions which are real problems require study and research .
Is constitute an objective treatment of the Academy of artistic representations of a phenomenon in the for
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreThis paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show More