MB Mahmood, BN Dhannoon
The matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreReliability is an essential measure and important component of all power system planning and operation procedures. It is one of the key design factors when designing complex, critical and expensive systems. This paper presents a fuzzy logic approach for reliability improvement planning purposes. Evaluating the reliability of the complex and large planned Iraqi super grid ;as Al- Khairat generating station with its tie set is intended to be compact to that grid; and determination of the given reliability improvement project are the major goals of the paper. Results show that the Iraqi super grid reliability is improved by 9.64%. In the proposed technique, fuzzy set theory is used to include imprecise indices of different components in normal
... Show MoreThe research problem is that the traditional methods of internal auditing are somewhat heavy with long and rigid procedures for the members of the audit process team, especially in light of the current developments that are reflected in the business environment and internal audit reports, so it is necessary to reconsider the traditional internal audit work method and assess the extent of its development by agile methods to reduce the time of the audit process on the activities and elements that add value and direct the effort and time to the activities and elements that add value to the work of the economic unit and the report of the internal auditor.
The research aims to study the possibility of applying agile internal auditing
... Show MoreOver the last few decades, many instructors have been trying all kinds of teaching methods, but without benefit. Nevertheless, in the 1986, a new technique is appeared which called K-W-L technique, it is specified for reading comprehension passages because reading skill is not easy matter for students for specific purposes (ESP).therefore, the K-W-L technique is a good one for thinking and experiences. To fulfill the aims and verify the hypothesis which reads as follows" it is hypothesized that there are no significant differences between the achievements of students who are taught according to K-W-L technique and those who are taught according to the traditional method
... Show MoreIn this work, an inventive photovoltaic evaporative cooling (PV/EC) hybrid system was constructed and experimentally investigated. The PV/EC hybrid system has the prosperous advantage of producing electrical energy and cooling the PV panel besides providing cooled-humid air. Two cooling techniques were utilized: backside evaporative cooling (case #1) and combined backside evaporative cooling with a front-side water spray technique (case #2). The water spraying on the front side of the PV panel is intermittent to minimize water and power consumption depending on the PV panel temperature. In addition, two pad thicknesses of 5 cm and 10 cm were investigated at three different water flow rates of 1, 2, and 3 lpm. In Case #1,
... Show MoreLive the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
The research deals with A very important two subjects, computer aided process planning (CAPP) and Quality of product with its dimintions which identified by the producer organization, the goal of the research is to Highlight and know the role of the CAPP technology to improve quality of the product of (rotor) in the engines factory in the general company for electrical industries, The research depends case study style by the direct visits of researcher to the work location to apply the operational paths generated by specialized computer program designed by researcher, and research divides into four axes, the first regard to the general structure of the research, the second to the theoretical review, the t
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More