Preferred Language
Articles
/
ijs-3977
Automatic Number Extraction from Fixed Imaging Distance
...Show More Authors

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then extracts this numbers region and convert it into binary image and extract the numbers as a text using OCR technique.

A camera for the Iphone 6 (8-megapixel) is used to take a snapshot of the meter screen. The red box in the meter is used to calculate the window coordinates (vertical and horizontal length) that contain the numbers in the original image. The results show a high level of accuracy, reaching 100% due to the effort done on pre-processing the digital images before feeding the part that contains the numbers into the OCR engine. Compared to the maximum accuracy obtained in other previous research of less than 100% in most of related works, the suggested method provide better approach to obtain the optimum results .

Despite the strong results, some challenges still need to be investigated further to find the best solutions, for example the issue of scratched or unclear meter screen, also the meter type 2 (the type that do not have the red box) 

Scopus Crossref
View Publication
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Using Retrieved Sources for Semantic and Lexical Plagiarism Detection
...Show More Authors

     Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Study of Some Plasma Characteristics in Dielectric Barrier Discharge (DBD) System
...Show More Authors

    In this present paper,  an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.

View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Gamma Ray Attenuation Coefficients for Lead Oxide and Iron Oxide Reinforced In Silicate Glasses as Radiation Shielding Windows
...Show More Authors

     In this work, the mass attenuation coefficient, effective atomic number and half value layer parameters were calculated for silicate (SiO2) mixed with various levels of lead oxide and iron oxide as reinforced materials. SiO2 was used with different concentrations of PbO and Fe2O3 (25, 50 and 75 weight %). The glass system was prepared by the melt-quenching method. The attenuation parameters were calculated at photon energies varying from 1keV to 100MeV using the XCOM program (version 3.1). In addition, the mass attenuation coefficient and half value layer parameters for selected glass samples were experimentally determined at photon energies 0.662 and 1.28 MeV emitted from radioactive sources 137Cs and 22Na respe

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Mechanical Properties and Corrosion Behavior of Low Carbon Steel Weldments
...Show More Authors

This research involves studying the mechanical properties and corrosion behavior of “low carbon steel” (0.077wt% C) before and after welding using Arc, MIG and TIG welding. The mechanical properties include testing of microhardness, tensile strength, the results indicate that microhardness of TIG, MIG welding is more than arc welding, while tensile strength in arc welding more than TIG and MIG.

The corrosion behavior of low carbon weldments was performed by potentiostat at scan rate 3mV.sec-1 in 3.5% NaCl to show the polarization resistance and calculate the corrosion rate from data of linear polarization by “Tafel extrapolation method”. The results indicate that the TIG welding increase the corrosion current d

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of a Nano (CdO)0.94:(In2O3) 0.06 / Si gas Sensor
...Show More Authors

In this work, a (CdO)0.94:(In2O3)0.06 film was developed on a glass substrate using Q- switching pulse laser beam (Nd:YAG; wavelength 1064 nm). The quantitative elemental analysis of the (CdO)0.94:(In2O3)0.06 thin film was achieved using energy dispersive X- ray diffraction (EDX). The topological and morphological properties of the deposited thin film were investigated using atomic force microscope (AFM) and field emission scan electron microscopy (FESEM). The I-V characteristic and Hall effect of (CdO)0.94 :(In2O3)0.06 thin films were used  to  study the electrical properties. The gas sensor prope

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Temperature and Frequency on the Dielectric Properties of PVC/MnCl2 Composite
...Show More Authors

       The dielectric properties of polyvinyl chloride (PVC)-MnCl2 composite were studied by using the impedance technique. The measurements were carried out as a function of frequency in the range from 10 Hz to 13 MHz and temperature range from 27oC to 55oC. Using a composite of 20 wt. % MnCl2 by weight, it was found that the dielectric constants and the dielectric loss of the prepared films increase with the increasing temperature at law frequency and the enhancement of the ionic conduction which is confirmed by the increase the of AC. conductivity and the decrease of the activation energy of the conduction mechanism at high applied frequency. The observed relaxation and polarization effects of composite a

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref