Vehicle detection (VD) plays a very essential role in Intelligent Transportation Systems (ITS) that have been intensively studied within the past years. The need for intelligent facilities expanded because the total number of vehicles is increasing rapidly in urban zones. Trafï¬c monitoring is an important element in the intelligent transportation system, which involves the detection, classification, tracking, and counting of vehicles. One of the key advantages of traffic video detection is that it provides traffic supervisors with the means to decrease congestion and improve highway planning. Vehicle detection in videos combines image processing in real-time with computerized pattern recognition in flexible stages. The real-time processing is very critical to keep the appropriate functionality of automated or continuously working systems. VD in road traffics has numerous applications in the transportation engineering field. In this review, different automated VD systems have been surveyed, with a focus on systems where the rectilinear stationary camera is positioned above intersections in the road rather than being mounted on the vehicle. Generally, three steps are utilized to acquire traffic condition information, including background subtraction (BS), vehicle detection and vehicle counting. First, we illustrate the concept of vehicle detection and discuss background subtraction for acquiring only moving objects. Then a variety of algorithms and techniques developed to detect vehicles are discussed beside illustrating their advantages and limitations. Finally, some limitations shared between the systems are demonstrated, such as the definition of ROI, focusing on only one aspect of detection, and the variation of accuracy with quality of videos. At the point when one can detect and classify vehicles, then it is probable to more improve the flow of the traffic and even give enormous information that can be valuable for many applications in the future.
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis
... Show MoreThe technology of change detection is a technique by which changes are verified in a certain time period. Remote sensing images are used to detect changes in agriculture land for the selected study area located south of Baghdad governorate in Agricultural Division of AL-Rasheed district because this method is very effective for assessing change compared to other traditional scanning techniques. In this research two remotely sensed images for the study area were taken by Landsat 8 and Sentinel-2, the difference between them is one month to monitor the change in the winter crops, especially the wheat crop, where the agriculture began for the wheat crop there in the Agricultural Division of AL-Rasheed district at 15
... Show MoreThis study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d
... Show MorePlagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will
... Show MoreSemantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po
A total of 533 specimens were collected in survey of Brachyceran species from different regions of Iraq during February to November 2014 .This study was reported 16 species belonging to 13 genera and 7 families, the results showed that Dicranosepsis Duda, 1926 (Family; Sepsidae) is recorded the genus for the first time in Iraq.