The printed Arabic character recognition are faced numerous challenges due to its character body which are changed depending on its position in any sentence (at beginning or in the middle or in the end of the word). This paper portrays recognition strategies. These strategies depend on new pre-processing processes, extraction the structural and numerical features to build databases for printed alphabetical Arabic characters. The database information that obtained from features extracted was applied in recognition stage. Minimum Distance Classifier technique (MDC) was used to classify and train the classes of characters. The procedure of one character against all characters (OAA) was used in determination the rate of recognition. The suggested approaches have yielded great and encouraging results in terms of accuracy in which the recognition rate reached to 97.28%. These approaches are faster and more efficient than other methods.
The study aimed to know the degree of availability of integrated preparation criteria in the Arabic Teacher training Program in Syrian universities from the viewpoint of university students of the Educational qualification diploma, and the degree of availability of these standards in the outputs of the preparation program. To achieve the Goals of the study, a list of integrated preparation criteria was prepare comprising (110) indicators, distributed to (11) criteria. The list was applied to a randomly chosen sample of (45) educational qualification diploma students. The results of the study showed that the Standards for integrated preparation are provided in a medium degree overall in the program for preparing teachers of Arabic languag
... Show MoreBackground: Fetal macrosomia is usually distressing to obstetricians and neonatologists. In the current study, involved mothers had poor social and medical circumstances, as they were migrated forcefully within the country borders due to war, from their original homeland to safer camps which had miserable situations. Objectives: To study rate, risk factors, and complications of macrosomia in people with low socio-economic living conditions and missed medical follow up. Methods: All internally displaced pregnant women who gave birth to neonates weighed ≥4000 g were involved in the study. All required history, examination, care, and investigations were practiced by the attending obstetrician and neonatologist. Cases of normal birth weight n
... Show MoreThe time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert
... Show MoreThe main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp
... Show MoreThis work studies the impact of input machining parameters of Electrical Discharge Machining (EDM) on the machining process performance. Tool steel O1 was selected as the workpiece material, copper as the electrode material, and kerosene as the dielectric medium. Experimental runs have been carried out with a Design of Experiment (DOE) technique. Twenty tests are accomplished with the current range of (18 to 24 Ampere), a pulse duration range of (150 to 200 µs), and a pulse-off time range of (25 to 75 µs). Based upon the experimental study's output results, the EDM parameter's effect (voltage of power supply, discharge current, pulse duration, and pulse pause interval) on the responses of the process represented by sur
... Show MoreThe Rate theory of crack growth in PVC pipe has been studied for creep and fatigue crack propagation. Rate theory function parameters, (RTFP), were estimated theoretically from exponential function parameters, (EFP), to experimental data of crack velocity versus stress intensity factor ,(V-K) diagram, to creep crack propagation . Also (RTFP) were estimated theoretically from (EFP) to experimental data of (V-?K) diagram to fatigue crack propagation. Temperature effect with (RTFP) was discussed. Crack velocity function denoted with stress intensity factor and temperature degrees has been determined to fatigue and creep crack propagation theoretically and comparative results this function with experimental data of (V-K or ?K) diagram .
sensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreControlling public expenditures is one of the main objectives of the public budget. The public budget often suffers from a deficit, whether in developed or developing countries, because expenditures are usually greater than the revenues generated. This requires the existence of financial rules that are adhered to by the government, which in turn leads to discipline. Fiscal policy leads to a reduction in the obligations incumbent on the government. Adhering to the financial rules would correct the course of fiscal policy in Iraq, with the need to direct oil revenues in the years of financial abundance when global oil prices rise to sovereign funds similar to other rentier countries, which contributes to maintaining the stabi
... Show MoreEfficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.
The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the