A .technology analysis image using crops agricultural of grading and sorting the test to conducted was experiment The device coupling the of sensor a with camera a and 75 * 75 * 50 dimensions with shape cube studio made-factory locally the study to studio the in taken were photos and ,)blue-green - red (lighting triple with equipped was studio The .used were neural artificial and technology processing image using maturity and quality ,damage of fruits the of characteristics external value the quality 0.92062, of was value regression the damage predict to used was network neural artificial The .network the using scheme regression a of means by 0.98654 of was regression the of maturity and 0.97981 of was regression the of .algorithm Marr
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreRefractories are mineral and chemical-, based, materials with excellent heat resistance, making them ideal for use in the construction of ovens, furnace walls industries. According to this our research is concerned to study the effect of addition of (4% CaO) and (5% graphite) on the silica brick properties. Different amounts of CaO and Graphite were included in the white sand (raw ingredients) of silica bricks as a binder to prepare the composition then the composition were sintered using Different sintering temperatures ranging from (1000–1400)𝛐C under static air. Density, thermal conductivity, porosity, and water absorption Compression there was power tested after sintering. XRD analysis was used to identify raw materials’
... Show MoreThe loose sand is subject to large settlement when it is exposed to high stresses. This settlement is due to the nature of the high drainage of sand, which displays foundations and constructions to a large danger. The densification of loose sandy soils is required to provide sufficient bearing capacity for the structures. Thus soil stabilization is used to avoid failure in the facilities. Traditional methods of stabilized sandy soil such as fly ash, bituminous, and cement often require an extended curing period. The use of polymers to stabilize sandy soils is more extensive nowadays because it does not require a long curing time in addition to being chemically stable. In this study, the effect of adding different percent
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More