This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with template standard numbers and letters used in the Iraqi plate. The system was implemented using Matlab (R2012a) and shows accurate performance results reached 93.33%
The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreNew chalcones of -{ - - - y - - hi di z e- -y he y - - e e- - e- - - substituted phenyl have been prepared from condensation of a new of 4-[5-(4`-tolyl)1,3,4-thiadiazole-2-yl] benzaldehyde (which is synthesized by the reaction of 2- amino-5- (4`-tolyl) -1,3,4-thiadiazole and benzaldehyde) with 3- or 4- substituted acetophenones in alkaline medium. The physical, CHNS analysis and spectral data of the synthesized compounds were determined. The biological activity evaluated of new compounds showed that many of these compounds possess antiba
... Show MoreA set newly complexes with the general formula [M(L)Cl2] are resulting from the reaction of a new schiff base ligand [Ethyl (6R,7R)-7-((E)-2-((2-ethoxy-2- oxoethoxy)imino)-2-(2-(((E)-4-nitrobenzylidene) amino) thiazol -4- yl) acetamido) -8- oxo -3- vinyl -5- thia -1-aza bicyclo [4. 2.0] oct -2- ene -2- carboxylate] (L). This ligand was derived from the reaction of the two substances 4-nitrobenzaldehyde and precursor (P). Reaction the ligand with metal ions M= Mn(II), Co(II), Ni(II), Cu(II) and Cd(II) afforded new complexes which are characterized by FT-IR and Electronic Spectra. These measurements indicate that the complexes have a tetrahedral geometry. The Penicillin-Binding Protein 3 (PBP3) of Staphylococcus aureus and the target protein
... Show MoreIn a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou
... Show MoreThis work was conducted to study the ability of locally prepared Zeolite NaY for the reduction of sulfur compounds from Iraqi natural gas by a continuous mode adsorption unit. Zeolite Y was hydrothermally synthesized using abundant kaolin clay as aluminum precursor. Characterization was made using chemical analysis, XRD and BET surface area. Results of the adsorption experiments showed that zeolite Y is an active adsorbent for removal H2S from natural gas and other gas streams. The effect of temperature was found inversely related to the removal efficiency. Increasing bed height was found to increase the removal efficiency at constant flow rate of natural gas. The adsorption capacity was evaluated and its maximum uptake was 5.345 mg H2S/g z
... Show MoreThe responsibility of the Central Bank through the implementation of its monetary policy to maintain the integrity and stability of the financial system and the economic system, because any shock, whether internal or external, may endanger the financial system and instability, so the research sheds light on the effectiveness of monetary policy in maintaining financial stability, The most important conclusion is that there is an increase in capital, which gives banks the possibility to face the risks to which they are exposed, as well as a rise in the total bad debts, which weakens its financial position, which constitutes a decline in the financial stability of these banks.
The research is summarized in the construction of a mathematical model using the most common methods in the science of Operations Research, which are the models of transportation and linear programming to find the best solution to the problem of the high cost of hajj in Iraq, and this is done by reaching the optimum number of pilgrims traveling through both land ports and the number Ideal for passengers traveling through airports by Iraqi Airways, instead of relying on the personal experience of the decision-maker in Hajj and Umrah Authority by identifying the best port for pilgrim's travel, which can tolerate right or wrong, has been based on scientific methods of Operations Research, the researcher built two mathematical models
... Show More