The matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single line of Arabic text, which convert and segments into words and then segments into letters. A multilayer feed forward neural network is trained to recognize these segments as characters. The final results indicate and clarify that the proposed system perform an effective accuracy of recognition rated up to 83% for Arabic text.
Abstract
The aim of the research is to develop specific skills of 21 century, one schedule, renewable: (sex, years of experience, academic degree) from the viewpoint of the research sample. The descriptive tool was used to collect information for research purposes. It was applied to a sample of (339) male and female teachers in Al-Ardhah governorate schools to teach Jazan. The application was carried out in the second semester of the year 1442 AH. The research concluded with a set of results, the most important of which are: the approval of the sample members to a large extent on the expressions of the role of school leaders in the practice of developing male and female teachers in acquiring these three skills fr
... Show MoreIn the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen species in an iron-dependent manner.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThe purpose of the current article lies in determining the impact of the suggestive exercises on the development of the mental capabilities of children. The researchers used the experimental method with a single-group design, which was appropriate for the core of the current article . The study samble has been specified as children aged 4-6 years in Umm Al-Rabi'een Kindergarten, with a total of 95 children. The study samble (15 children) was randomly selected. . After the exercises were completed, the post-tests have been carried out on the sample with similar circumstances as that of pre-tests. Researchers used statistical methods in the SPSS program. After the results were presented, analyzed, and discussed, The resear
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreThe present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t
... Show MoreThis research aims to identify the effect of numbered heads strategy on developing oral expression skills among fifth-grade primary students in Bisha Province. To achieve this, the researcher prepared a research tool represented in the observation card which consists of (27) statements distributed in four axes. The tool was sent to (5) experts in the field to verify their validity. In light of their corrections, the tool was developed to be valid for gathering field information. To verify the validity of the content and the reliability of the tool, the researcher applied it to a sample consists of (20) students from outside the research group. The overall coefficient of correlation between the statements of the tool is as follows: (.95,
... Show More