INTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound systems. METHODS: The utilization of AI and ML algorithms has gained significant traction in the realm of defect detection. This is attributed to their ability to process vast amounts of data and discern patterns that may have otherwise eluded detection. The aforementioned tools have the capability to anticipate potential flaws and implement pre-emptive measures to avert their occurrence. RESULTS: The detection of defects in automated manufacturing systems is a continuous process that necessitates meticulous observation and examination to guarantee prompt and effective identification and resolution of defects. CONCLUSION: The utilization of suitable tools and technologies is imperative for manufacturers to guarantee optimal production quality and operational success.
In this work, results of a mathematical analysis of the role of workpiece preheating in laser keyhole welding were presented. This analysis considered the steady-state welding as well as certain range of boundary conditions over which preheating effect would be indicated. This work is an attempt to interpret the role of preheating to increase welding depth and perform keyhole welding with high quality using physical and thermal properties of steel alloys.
Friction stir welding (FSW) of Tee-joints is obtained by inserting a specially designed rotating pin into the clamped blanks, through top plate (skin) to bottom plate (stringer), and then moving it along the joint, limiting the contact between the tool shoulder and the skin. The present work aims to investigate the defects occur for Tee-joint of an Aluminum alloy (Al 5456) with dimensions (180mm x 70mm) for the skin plate, (180mm x 30mm) for stringer plate and thickness of (4mm).
The effects of welding parameters such as rotational speed, linear speed, plunging depth, tool tilting, and die radii of welding fixture on the welding quality of Aluminum Alloy will be studied. Weld defects had been summarized and studied, and then the best
The research material was prune plums (
The research material was prune plums (
The current research is concerned with methods of formation and their effect on the sintering process of ceramic materials. The research is divided into a number of chapters. The first chapter addressed the research structure (the research problem, importance, objective, limits, and it also defined the terms used in the research). The second chapter addressed the theoretical framework, where the theoretical framework has been divided into three sections. The first section dealt with methods of formation of ceramic materials including: Plasticizing method 2- semi-dry pressing method 3- dry pressing method 4- extrusion method 5- casting method.
The researcher found that there is a clear difference between the methods through her formati
The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreSeveral Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show More