This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with template standard numbers and letters used in the Iraqi plate. The system was implemented using Matlab (R2012a) and shows accurate performance results reached 93.33%
Increasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreDiabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou
... Show MoreIn this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i
... Show MoreTwo compounds,[2-amino-4-(4-nitro phenyl) 1,3-thiazole],(4) and [2-amino-4-(4-bromo phenyl) 1,3-thiazole],(5), were synthesized by refluxing thiourea (1) with each of para-ntiro and para-bomophanacyl bromides(2) and (3) respectively, in absolute methanol. Then, by reaction of [5] with 3,5-dinitrobenzoyl chloride in dimethylformamide (DMF) yielded (6) .On the other hand, reaction of (4) with chloroacetyl chloride in dry benzene afforded (7), which is upon treatment with thiourea in absolute methanol, af
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
