In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreBack ground: Diabetic nephropathy is rapidly becoming the leading cause of end-stage renal disease (ESRD). The onset and course of DN can be ameliorated to a very significant degree if intervention institutes at a point very early in the course of the development of this complication.
Objective: The aim of this study was to characterize risk factors associated with nephropathy in type I diabetes and construct a module for early prediction of diabetic nephropathy (DN) by analyzing their risk factors.
Methods: Case control design of 400 patients with type I diabetes mellitus (IDDM), aged 19-45 years. The cases were 200 diabetic patients with overt protein urea while the controls were 200 diabetic patients with no protein urea or micr
Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreThis research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show More