The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.
The aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreDry environment study forms an important part in the field of applies geomorphology for
the wide rang of its lands which form most of the world, homeland, and Iraqi lands specially,
and what these lands include of scientific cases which needs to be searched and investigated.
They include rocks, land shapes, water supplements, its ancient soil and its active diggings are
all signs of the environment changes and effects that these lands under take over time, with
continuous remains of its features of characteristics under geo morphological dry
circumstances which works to slow change average, when the geomorphologic fearers varies
in this environment and what it contain of important economical resource. As to participl
This study is an attempt to investigate the conceptual metaphor of UP and DOWN commonly used in Iraqi community. Some of the metaphorical expressions in Iraqi colloquial Arabicarewidely used by Iraqi speakers in everyday language. Ithas been analyzed by following the cognitive theory of metaphor (Lakoff& Johnson,1980).The study indicates that the Iraqi speakerexperiences more of the metaphorical expressions of UP and DOWN to referto many of the abstract concepts that shape his/her impression of everyday life situations.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Theauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea
Perhaps masculinity and femininity in our Arabic language are among the linguistic issues that have occupied the attention of researchers, ancient and modern. Many books, works, and research have been written on this subject, but there is still something in it that must be revealed, clarified, and established, as the ancients did not classify the feminine and masculine into real, metaphorical, auditory, analogical,
This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show More