Preferred Language
Articles
/
bsj-7877
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabets are detected using the mathematical algorithm of the morphological gradient. After that, the images are passed to the CNN architecture. The available database of Arabic handwritten alphabets on Kaggle is utilized for examining the model. This database consists of 16,800 images divided into two datasets: 13,440 images for training and 3,360 for validation. As a result, the model gives a remarkable accuracy equal to 99.02%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
Training Program based on Some Strategies of Self-Regulated Learning for the Teachers of Mathematics and its Effect on their Relational Mathematics
...Show More Authors

This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Baghdad Science Journal
Isolation and identification of the Myxobacterium Myxococcus fulvus from the Farms and study the inhibitory effect of cells and filtrates against pathogenic fungi
...Show More Authors

The study was performed to isolate and identify the Myxococcus fulvus from the one hundred samples of soils of farms. Special growth conditions had been used to support the growth of M.fulvus local isolates and suppressed the growth of other microorganisms like (Drying , High Temperature , High concentration of antibiotics and specific growth media ) M.fulvus isolates had been subjected to the morphological, cultural , biochemical examination for identification , as well as , study the inhibitory activites of cells and filtrates of localized isolates against some pathogenic fungi include (Trichophyton mentagrophytes , Microsporum gypseum , Aspergillus niger and Fusarium oxyporum ) by using three methods :- Cup assay , well diffusio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 06 2016
Journal Name
Al-qadisiyah Journal For Administrative And Economic Sciences
Awareness of the regulatory and administrative leadership and its role in achieving the effectiveness of the internal control system and achieve fair accountability
...Show More Authors

The research aims to achieve a set of the most important objectives of the review of the role of creative administrative leadership in achieving aspects of economic reform in various government institutions and indicate the role of supervisory awareness of administrative leadership in the revitalization of the role of the internal control system to achieve the best use of available resources. This paper deals with three problems is the loss of financial resources of the state as a result of the growing phenomenon of administrative and financial corruption in the majority of government institutions, and the weakness of the role of the internal control system in the province on the resources available and to achieve the best use of these reso

... Show More
Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
College Of Islamic Sciences
The amusement of the Qur'an shown Of the Prophet, peace and blessings be upon him, the Seal of the Messengers
...Show More Authors

The affliction is a remaining year and not a past incident, and the most evil people are the prophets - peace and blessings be upon them - and the most severe is the Imam of the Prophets Muhammad - may God bless him and grant him peace - because they are exposed to harm from their people because of their call to a religion that violates the religion of parents and grandparents, the religion of injustice and injustice And polytheism and disbelief, and therefore the Qur'an had attitudes towards the entertainment of the people of affliction in general and our beloved - peace be upon him - in particular, this research came about the entertainment of the Qur’an for the Prophet - may God bless him and grant him peace - and many areas of ente

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
International Journal Of English And Literature
THE FORMS AND FUNCTIONS OF APOLOGIES WITH INDICATIVE REFERENCES TO THE LETTERS OF KEATS AND BYRON
...Show More Authors

11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from

... Show More
Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Find the concentration of radon gas emitted naturally from the bones and skin of some kinds of birds and local and imported chicken available in the City of Baghdad
...Show More Authors

In the present research we the study the deposition of radioactive elements naturally and particularly radioactive radon gas in parts of the body of organisms which are of direct relevance to human life in the city of Baghdad as the samples which were collected from the bones and skin of some kinds of birds and chicken based on the principle that radioactive elements are concentrated always on the bones. We use of this as the exercise detector impact nuclear (CR-39), using the technology Cylindrical diffusion , the results indicated that the largest concentration of radon found in the bone bird Seagull tapered as it was (625 ± 37) Bq.cm-3, and less concentration of radon gas in the chicken bones of Al-kafeel as it was (105 ± 10) Bq.c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
KHalaf Alhmar and what we get from his poem
...Show More Authors

KHalaf Alhmar and what we get from his poem

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
...Show More Authors

        A new generalizations of coretractable modules are introduced where a module  is called t-essentially (weakly t-essentially) coretractable if for all proper submodule  of , there exists f End( ), f( )=0 and Imf tes  (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref