The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.
The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreNanoparticle has pulled in expanding consideration with the developing enthusiasm for nanotechnology which hold potential as essential segments for development applications. In the present work, a copper nanoparticle is manufactured as a suspension in distilled water by beating a bulk copper target with laser source (532 nm wavelength, 10 ns pulse duration and 10 Hz repletion rate) via method. UV- visible absorption spectra and AFM analysis has been done to observe the effect of repetition rate for the pulsation of laser. Copper nanoparticles (Cu-NPs) were successfully synthesized with green color. The Cu- NPs have very high purity because the preparation was managed in aqueous media to eliminate ambient contaminations. Absorption
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreAbstract
Social media has thrived recently and public organizations at Thi-Qar governorate across different levels are experimenting with launching government social media (GSM) to facilitating two-way interactions between the government and its citizens. Both scholars and practitioners are focusing on understanding the key success factors related to the create of GSM. This study aimed to identify the key success factors by exploring the formation mechanism of individuals’ continuous usage intention. Through the theoretical perspective of the uses and gratifications theory. We identify the gratification factors that stimulate users’ continuance intention toward GSM. Furthermore, we draw upon the stimulus–organism–
... Show MoreA gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau