Preferred Language
Articles
/
bsj-7877
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

The use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.

International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:

                

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
Journal Of Legal Sciences
The Moment of Contract Formation under the United Nations Convention on Contracts for the International Sale of Goods (1980) – A Comparative Study
...Show More Authors

There are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff

... Show More
View Publication
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
The Reasons for the Behavior of Bullying school Students in the first grade average from the point of view of teachers and teachers and methods of modification
...Show More Authors

 هدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Microneedles as A Magical Technology to facilitate Transdermal Drug Delivery: A Review Article
...Show More Authors

Skin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 23 2021
Journal Name
Al-nahrain Journal Of Science
A Clinical-Statistical Study on COVID-19 Cases in Iraq: A Case Study
...Show More Authors

Background: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (122)
Crossref (115)
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Pressure Control of Electro-Hydraulic Servovalve and Transmission Line Effect
...Show More Authors

The effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 26 2025
Journal Name
Al–bahith Al–a'alami
The role of Iraqi newspapers in instilling political culture among the public after 2003, a field study on the audience of the city of Baghdad
...Show More Authors

The role of Iraqi newspapers in instilling political culture among the public after 2003, a field study on the audience of the city of Baghdad, University of Baghdad, College of Information, Department of Journalism, 2019,
The problem of research is to investigate the role of Iraqi newspapers in instilling the political culture of individuals after 2003, and monitor this role Through the contents and messages provided by the Iraqi newspapers to the public. the research is classified within descriptive research, it adopts the survey methodology and used the questionnaire tool. In fact, the questionnaire was distributed to a sample of 400 individuals that was selected according to the method of multi-stage cluster sample of those who re

... Show More
View Publication Preview PDF
Crossref