The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.
Several million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up to 10%. Whereas,
... Show MoreIn this study a concentration of uranium was measured for twenty two samples of soil distributed in many regions (algolan, almoalmeen, alaskary and nasal streets) from Falluja Cityin AL-Anbar Governorate in addition to other region (alandlos street) as a back ground on the Falluja City that there is no military operations happened on it. The uranium concentrations in soil samples measured by using fission tracks registration in (PM-355) track detector that caused by the bombardment of (U) with thermal neutrons from (241Am-Be) neutron source that has flux of (5×103n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. The results shows that the uranium concentrations algolan street varies from(1.
... Show MoreAbstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreAn idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreAcne vulgaris is a very common, chronic disorder, involving inflammation of the pilosebaceous units that can be varied in presentation and difficult to treat. Inflammatory acne may yield both scarring and pigmentary changes so early and adequate therapy will, in all cases, decrease its severity and may entirely suppress this disease. Serratiopeptidase has anti-inflammatory, anti-edemic and fibrinolytic activity and acts rapidly on localized inflammation. Serratiopeptidase was added in aim to hasten acne resolution. During March to July 2010, A comparative study for a 50 healthy patient suffering from acne was divided into 2 groups: 1st group treated by common acne modalities and the 2nd one with same modalities
... Show MoreIn Baghdad city, Iraq, the traffic volumes have rapidly grown during the last 15 years. Road networks need to reevaluate and decide if they are operating properly or not regarding the increase in the number of vehicles. Al-Jadriyah intersection (a four-leg signalized intersection) and Kamal Junblat Square (a multi-lane roundabout), which are two important intersections in Baghdad city with high traffic volumes, were selected to be reevaluated by the SIDRA package in this research. Traffic volume and vehicle movement data were abstracted from videotapes by the Smart Traffic Analyzer (STA) Software. The performance measures include delay and LOS. The analysis results by SIDRA Intersection 8.0.1 show that the performance of the roundab
... Show MoreIn this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.
Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More