Preferred Language
Articles
/
ijs-3977
Automatic Number Extraction from Fixed Imaging Distance

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then extracts this numbers region and convert it into binary image and extract the numbers as a text using OCR technique.

A camera for the Iphone 6 (8-megapixel) is used to take a snapshot of the meter screen. The red box in the meter is used to calculate the window coordinates (vertical and horizontal length) that contain the numbers in the original image. The results show a high level of accuracy, reaching 100% due to the effort done on pre-processing the digital images before feeding the part that contains the numbers into the OCR engine. Compared to the maximum accuracy obtained in other previous research of less than 100% in most of related works, the suggested method provide better approach to obtain the optimum results .

Despite the strong results, some challenges still need to be investigated further to find the best solutions, for example the issue of scratched or unclear meter screen, also the meter type 2 (the type that do not have the red box) 

Scopus Crossref
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Vehicles Detection System at Different Weather Conditions

The importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Silver Nanoparticles as a selective probe for Mercury Ions: A Review

   Nanochemistry is a significant area which involves the synthesis, design, and manipulation of particle structures with dimensions ranging from 1 to 100 nanometres. It is now one of the major concerns of pharmaceutical and biological researchers. The current study discusses recent advances in the use of silver nanoparticles (AgNPs) as a selective sensor for qualitative and colorimetric quantitative detection of mercury ions.   The synthesis of significant noble metal AgNPs is described as a novel, low-cost, quick, and simple method for detecting mercury ions. Due to the seriousness of mercury toxicity to our cells, AgNPs may be successfully employed for the detection of ecologically harmful mercury ions in a wide variety of aqueous

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Study of Land Cover Changes of Baghdad Using Multi-Temporal Landsat Satellite Images

The main goal of this work is study the land cover changes for "Baghdad city" over a period of (30) years using multi-temporal Landsat satellite images (TM, ETM+ and OLI) acquired in 1984, 2000, and 2015 respectively. In this work, The principal components analysis transform has been utilized as multi operators, (i.e. enhancement, compressor, and temporal change detector). Since most of the image band's information are presented in the first PCs image. Then, the PC1 image for all three years is partitioned into variable sized blocks using quad tree technique. Several different methods of classification have been used to classify Landsat satellite images; these are, proposed method singular value decomposition (SVD) using Visual Basic sof

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Science
Interpretation of Potential Fields and Detection of Deep Faults of Kut-Dewania- Fajir Area, Central Iraq

Gravity and magnetic data are used to study the tectonic situation of Kut- Dewania- Fajir and surrounding areas in central Iraq. The study includes the using of window method with different spacing to separate the residual from regional anomalies of gravity and magnetic data. The Total Horizontal Derivative (THD) techniques used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The obtained faults trends from gravity data are (N30W), (N60W) (N80E) and (N20E) and from magnetic data are (N30W), (N70E), (N20E),(N10W),(N40E). It is believed that these faults extend from the basement to the lower layers of the sedimentary rocks except the N60W trend that observed clearly in gravity in

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Community Detection under Stochastic Block Model Likelihood Optimization via Tabu Search –Fuzzy C-Mean Method for Social Network Data

     Structure of network, which is known as community detection in networks, has received a great attention in diverse topics, including social sciences, biological studies, politics, etc. There are a large number of studies and practical approaches that were designed to solve the problem of finding the structure of the network. The definition of complex network model based on clustering is a non-deterministic polynomial-time hardness (NP-hard) problem. There are no ideal techniques to define the clustering. Here, we present a statistical approach based on using the likelihood function of a Stochastic Block Model (SBM). The objective is to define the general model and select the best model with high quality. Therefor

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Promoting Clinical Breast Examination as A screening Tool for Breast Cancer in Iraq

Breast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs couple

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Heuristic Modularity for Complex Identification in Protein-Protein Interaction Networks

     Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function.   The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties.  The modulari

... Show More
Scopus (10)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF