The matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single line of Arabic text, which convert and segments into words and then segments into letters. A multilayer feed forward neural network is trained to recognize these segments as characters. The final results indicate and clarify that the proposed system perform an effective accuracy of recognition rated up to 83% for Arabic text.
The objective of this study is to demonstrate the corrosion behavior of dental alloys Co-Cr-Mo, Ni-Cr-Mo and Ti-Al-V in artificial saliva at pH=4 and 37oC enriched with ethyl alcohol at 8% percentage. The linear and cyclic polarizations were investigated by electrochemical measurements. Laser surface modification was achieved for the three dental alloys to improve corrosion resistance. The results show that corrosion resistance of Co-Cr-Mo and Ni-Cr-Mo alloys only were increased after laser treatment due to the fact that laser radiation has caused a smoother surface, in addition to the decrement in corrosion current densities (icorr) for Co-Cr-Mo and Ni-Cr-Mo alloys and the reverse scan in cyclic polarization became in the wider range of
... Show MoreEmotional exhaustion considered one of the critical factors in the formation and composition of organizational behavior of individuals within organizations, as well as social behavior and psychological, and emotional exhaustion is one of the three components of burnout, as well as depersonalization (cynicism) and low achievement, the emergence of research relevant to this concept began at the beginning of the seventies of the twentieth century, then started to become clear features in the eighties it. This research aims to build intellectual framework for draining emotional exhaustion through highlight on most important philosophical contents, as well as review and analysis of some models associated with this concept, and then a
... Show MoreAbstract
The study discussed three areas in strategic thinking, namely, (patterns elements, outcomes) , this study aimed to measure extent to which strategic leaders have the type or types of patterns of strategic thinking, and measure the extent of their use of the elements of strategic thinking, and measurement of strategic thinking outcomes for managers at various levels , And to know the relationship between the modes of strategic thinking, elements and outcomes in organizations. the study included five banks and four hospitals and four colleges and universities, has been a research sample consisted of 168 individuals, distributed in positions (Director General , Director of Directorate , Director of
... Show MoreThis paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreIn this paper, thermal performance of a zig-zig solar air heater (ZZSAH) with and without using steel wire mesh on the absorber plate of the collector is experimentally investigated. The experimental work includes four inclination angles of the collector 20o, 30o, 45o, and 60o and four air mass flow rates of 0.03, 0.04, 0.06, and 0.08 kg/s under varieties of operating conditions of a geographic location of Baghdad. New correlation equations of Nusselt number are obtained from experimental results for both types of collectors where the effect of varying of the inclination angle of collector taken into consideration in the experiment. The correlations show good agreement wi
... Show MoreThe primary goal of root canal treatment (RCT) is to expel the presence of any necrotic or vital tissue, microbes and their byproducts from the canal space before press forward with the following steps of the RCT procedures. Although this is difficult to attain, various strives had been practiced by employing chemical and mechanical methods to eliminate as much microorganisms as possible and make the canal space valid for the obturation materials to be received. The aim of this review is to demonstrate some of what new remedies that could be used as root canal disinfectant by summarizing the recent studies regarding the efficacy of different natural products against the most persistence microbiota that could be responsible for most
... Show MoreThis review examines how artificial intelligence (AI) including machine learning (ML), deep learning (DL), and the Internet of Things (IoT) is transforming operations across exploration, production, and refining in the Middle Eastern oil and gas sector. Using a systematic literature review approach, the study analyzes AI adoption in upstream, midstream, and downstream activities, with a focus on predictive maintenance, emission monitoring, and digital transformation. It identifies both opportunities and challenges in applying AI to achieve environmental and economic goals. Although adoption levels vary across the region, countries such as Saudi Arabia, the UAE, and Qatar are leading initiatives that align with global sustainability targets.
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More