According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through the conveyor belt motion. An optimal speed controlling mechanism of the conveyor belt is presented by detecting smartly the parts' number and weights using the vision sensor, where the latter will give sufficient visualization about the system. Then image processing will deliver the important data to ANN, which will optimally decide the best conveyor belt speed. This decided speed will achieve the aim of power saving in belt motion. The proposed controlling system will optimally switch the speed of the conveyor belt system to ON, OFF and idle status in order to minimize the consumption of energy in the conveyor belt. As the conveyor belt is fully loaded it moves at its maximum speed. But if the conveyor is partially loaded, the speed will be adjusted accordingly by the ANN. If no loading existed, the conveyor will be stopped. By this way, a very significant energy amount in addition to cost will be saved. The developed conveyor belt system will modernize industrial manufacturing lines, besides reducing energy consumption and cost and increasing the conveyor belts lifetime
In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MorePurpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally.
Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the t
... Show MoreObjective(s): To evaluate nurses' practices who work in respiratory intensive care units to control the
complications of patients admitted at this unit and determine the relationship between nurses' sociodemographic
characteristics and their practices.
Methodology: A descriptive study was carried out at Respiratory Care Unit at Baghdad teaching hospitals that
started from February 22th, 2013 to August 30th, 2013. A purposive "non-probability" sample of (70) nurses who
work in Respiratory Care Unit was selected from Baghdad teaching hospitals. The data were collected through the
use of constructed questionnaire that consists of two parts; (l) Demographic data form that consists of 7items and
(2) nurses' practice form