Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreAttack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreThis study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.
The aim of this work is to provide an efficient selection technique as a part of planning process to guide the decision makers to decide the preferences of one supplier over another for purchasing lab instruments in education domain. Fuzzy Analytical Hierarchy Process has used as a multi-criteria decision process, as an industrial engineering tool with certain emphasis on the qualitative aspects required to the decision makers. While the concept of degree of possibility for each criterion is used to reach its relative weights, a specific methodology created to reach the final objective decision of supplier selection. A questionnaire form was developed and distributed to five universities located in Baghdad province with a total
... Show MoreTelevision contributes children the acquisition of knowledge, moral and social values through programs that are offered to them and the extent of the focus on the effective aspects of life in the age of the target stage. The subject of this research aims to know the children programs in Libya television through a comprehensive analytical study of the program entitled “zihur al-hayat” within the broadcast season from April 1, 2004 to June 30, 2004. It also focuses on trying to identify the Libyan television policy in broadcast educational content through the children's programs in the prevailing political and social conditions during the period of study as well as knowing the opinions of the children's sample under study in Al-Baidhaa
... Show More