This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with template standard numbers and letters used in the Iraqi plate. The system was implemented using Matlab (R2012a) and shows accurate performance results reached 93.33%
The financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreObjectives of the study: The main objective of the study is to assess the prevalence of hypertension among
cardiac diseases patients and to fiend out relation ship between hypertension and cardiovascular diseases.
Methodology: A descriptive study, using interviewer and questionnaire technique was conducted on cardiac
diseases inpatients of clinic unite at Kirkuk and Azady hospitals from 17th ,June ,2012 to 1st, March , 2013.
Non – probability (purposive) sample of (148) adult patients, (81) females and (67) males with heart disease are
selected from inpatients of clinic unite at Kirkuk and Azady hospitals at kirkuk city. Questionnaire was
developed to assess the items which are related to heart disease patient's (Dise
Experimental results for the density of states of hydrogenated amorphous silicon due to Jackson et al near the valence and conduction band edges were analyzed using Levenberg-Marquardt nonlinear fitting method. It is found that the density of states of the valence band and the conduction band can be fitted to a simple power law, with a power index 0.60 near the valence band edge, and 0.55 near the conduction band edge. These results indicate a modest but noticeable deviation from the square root law (power index=0.5) which is found in crystalline semiconductors. Analysis of Jackson et al density of states integral J(E) data over about (1.4 eV) of photon energy range, showed a significant fit to a simple power law with a power index of 2.11
... Show MorePerhaps the issue of media and the press, especially one of the most common topics that people deliberate and deal with permanently and continuously. An issue of such significance has pushed researchers to put the following question, “Is it possible to live without media?”, “Can people ignore the newspaper, radio, TV, or the other communication means?”
The answer is very simple. It is difficult for civilized society to overtake information, or dispense with circulation, at the individual or collective level. Yet, the question of how to make the media and how it determines its content still requires extensive media experience; and knowledge of the social structure and its relations; and ac
... Show MoreHistory matching is a significant stage in reservoir modeling for evaluating past reservoir performance and predicting future behavior. This paper is primarily focused on the calibration of the dynamic reservoir model for the Meshrif formation, which is the main reservoir in the Garraf oilfield. A full-field reservoir model with 110 producing wells is constructed using a comprehensive dataset that includes geological, pressure-volume-temperature (PVT), and rock property information. The resulting 3D geologic model provides detailed information on water saturation, permeability, porosity, and net thickness to gross thickness for each grid cell, and forms the basis for constructing the dynamic reservoir model. The dynamic reservoir mo
... Show MoreThis research aim to recognize
satisfy of life in the university's student and balance in satisfy of life
according to two type aveirable sex specific and find type and
relationship's director between satisfy of life and character big factors.
and known hom much that Factors in satisfy of life, the research sample
consist of (401) student male and female and from both specified in
Baghdad's University, researcher bult scale of Costa &McCrae Fore the
fire big Factors to Personality, research result That the university's
student low level of satisfy of life and there are no different statically if
they are scientific or human in their study. And there is positive and there
is positive and indicate relation
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreFeatures is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show More