Preferred Language
Articles
/
bsj-7877
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Computers & Electrical Engineering
A new proposed statistical feature extraction method in speech emotion recognition
...Show More Authors

View Publication
Scopus (42)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
A COMPARATIVE STUDY OF THE AMOUNT OF FORCE EXERTED ON THE GROUND AND THE TIME OF PROPULSION IN THE VERTICAL AND HORIZONTAL JUMPING TESTS FROM STABILITY USING A FOOT SCAN DEVICE
...Show More Authors

Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Morphological, histochemical and histological study of the ileum in the Iraqi Black Partridge (Francolinus francolinus)
...Show More Authors
Abstract<p>Objective: This project aimed to study the morphological description and histological structure of ileum in Iraqi black partridge (<italic>Francolinus francolinus</italic>). Methods: To conduct this investigation, 20 healthy Iraqi black partridge were collected from local suppliers. Birds were euthanized, dissected and then specimens were processed for histological and histochemical staining techniques. Results: A morphological study showed that the ileum appears as a short narrow tubular structure. It extends from the wide end of the jejunum and ends in the Ileo-caecal junction region. Histologically, the wall ileum consists of four tunica mucosa, submucosa, muscularis and </p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
MORPHOLOGICAL DESCRIPTION AND HISTOLOGICAL STRUCTURE OF THE JEJUNUM IN THE IRAQI BLACK PARTRIDGE (FRANCOLINUS FRANCOLINUS)
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
MORPHOLOGICAL DESCRIPTION AND HISTOLOGICAL STRUCTURE OF THE JEJUNUM IN THE IRAQI BLACK PARTRIDGE (FRANCOLINUS FRANCOLINUS)
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparative Evaluation of Using Intranasal Desmopressin, Parenteral Diclofenac or their Combination in the Management of Acute Renal Colic Pain in Iraqi Patients
...Show More Authors

         There is a suggestion that an antidiuretic hormone-induced decrease in diuresis might contribute to the rapid relief of the acute pain in renal colic. This study was designed to evaluate the efficacy of desmopressin nasal spray compared with diclofenac given intramuscularly in patients with acute renal colic. The study included 75 patients randomized into three different groups; group A received desmopressin (40 μg, nasal spray), group B diclofenac (75 mg) intramuscularly and group C, both desmopressin and diclofenac. Pain was assessed using a visual analogue scale (a 10-cm horizontal scale ranging from `no pain' to `unbearable pain') at baseline, 10, 20 and 30 min after administering t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
The relationship of using the social networking site Facebook to the accumulation of social capital: (Survey study for a sample of students from the University of Algiers 3)
...Show More Authors

The subject of social capital is of great importance, as it provides an analytical framework for researchers interested in understanding the impact of the Internet on many dimensions of human and social life. And because social networking sites have infiltrated societies and produced new variables at the level of human and social communication, this study came to examine the relationship between the use of the social networking site Facebook and the accumulation of social capital among a sample of University of Algeria 3 students, by researching the variables of intensity of use and patterns of use as independent variables and their relationship to social capital. The results of the field study revealed a strong relationship between the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Land Use/Cover Change Analysis Using Remote Sensing Data: A Case Study, Zhengzhou Area, Henan Province, China
...Show More Authors

In the last two decades, arid and semi-arid regions of China suffered rapid changes in the Land Use/Cover Change (LUCC) due to increasing demand on food, resulting from growing population. In the process of this study, we established the land use/cover classification in addition to remote sensing characteristics. This was done by analysis of the dynamics of (LUCC) in Zhengzhou area for the period 1988-2006. Interpretation of a laminar extraction technique was implied in the identification of typical attributes of land use/cover types. A prominent result of the study indicates a gradual development in urbanization giving a gradual reduction in crop field area, due to the progressive economy in Zhengzhou. The results also reflect degradati

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More