In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algorithm, Connect Component Analysis (CCA) have been exploited for segmenting characters. Finally, a Multi-Layer Perceptron Artificial Neural Network (MLPANN) model is utilized to recognize and detect the vehicle license plate characters, and hence the results are displayed as a text on GUI. The proposed system successfully identified and recognized multi_style Iraqi license plates using different image situations and it was evaluated based on different metrics performance, achieving an overall system performance of 91.99%. This results shows the effectiveness of the proposed method compared with other existing methods, whose average recognition rate is 86% and the average processing time of one image is 0.242 s which proves the practicality of the proposed method
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).
Two novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreThe world is witnessing a remarkable development in the use of technology, which has made it an essential means of investment, especially in the field of management, which provided many of the facilities experienced by the institutions, including improving revenues, shortening time and saving labor. Islamic investment technology as a successful means of management and we touched on the Zakat Foundation as an application model.
Fusarium pseudograminearum and Fusarium graminearum commonly cause crown rot (FCR) and head blight (FHB) in wheat, respectively. Disease infection and spread can be reduced by the deployment of resistant cultivars or through management practices that limit inoculum load. Plants deficient in micronutrients, including zinc, tend to be more susceptible to many diseases. On the other hands, and zinc deficiency in cereals is widespread in Australian soils. Zinc deficiency may have particular relevance to crown rot, the most important and damaging Fusarium disease of wheat and barley in Australia. Four wheat genotypes; Batavia, Sunco and two lines from the International Maize and Wheat Improvement Center (CIMMYT) were tested for response
... Show MoreThe present study aims at examining the stylistic development in the crafts of the sculptor Mohammed Ghani Hikmat. It gives answers to the following two questions: what is the nature of the stylistic development? And what are these principles and techniques led him to this development? The researcher has used the descriptive, analytic approach in examining the selected five samples out of the sculptor’s displayed crafts. The observational technique is used as a tool of examination. Among the main findings are: integrating space in the cubic crafts, represented by the existence of holes within this general construction of that space; the evident influence of critical contemporary orientations through the direct insertion of recipients i
... Show More