Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically rather than a long time consuming manually gathering for the information. In this article, transfer learning is employed to train two distinct YOLOv8 models for enhanced automatic number plate recognition (ANPR). This approach leverages the strengths of YOLOv8 in handling complex patterns and variations in license plate designs, showcasing significant promise for real-world applications in vehicle identification and law enforcement.
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreAH Haider R, N Adil A, AW Makram M, AK Abdulkaleq S, 2010
Three species of nematodes are recorded from alimentary tracts of some Iraqi bats for the first tithe, while reporting Thelandros alatus constitutes first record of this species from mammals. Information on infection rate, distribution and halts are provided along with some relevant remarks.
HR Al-Hamami, AA Noaimi, MM Al-Waiz, AS Al-Kabraty, Iraqi Postgraduate Medical Journal, 2010 - Cited by 4
Detection of virulence gene agglutinin-like sequence (ALS) 1 by using molecular technology from clinical samples (
Background: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreIn his life, a person engages in different types of verbal and actual dispositions that result in various effects, some of which are necessary and not valid, such as selling, and some are not necessary for one of the two contracting parties, such as a mortgage or both, such as lending and agency. However, there are some actions that are sometimes necessary and not necessary at other times, such as a gift that indicates in its simplest sense. Owning money for another without compensation, it is one of the doors of benevolence and benevolence, and it is one of the attributes of perfection with which God, may He be glorified and exalted be He, described Himself. - And if this analogy is the difference - and distanced himself from greed, the
... Show More
