Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles
...Show More Authors
he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreThe exploitation of all available resources and benefiting from them is one of the most important problems facing the decision makers at the present time. In order to exploit these resources, it is necessary to organize the conflicting objectives, which is the main work in the project management, which enables the development of a plan that decision makers can use to shorten the total completion time and reduce the total cost of the project. Through the use of modern scientific techniques, and therefore the researcher using the critical path method using the technology of programming goals to find more efficient ways to make appropriate decisions where the researcher worked to solve the problems in the construction of the Departm
... Show MoreA long-span Prestressed Concrete Hunched Beam with Multi-Quadrilateral Opening has been developed as an alternative to steel structural elements. An experimental program was created and evaluated utilizing a single mid-span monotonic static load on simply supported beams, which included six beams with openings and the solid control beam without openings, to investigate the performance of such beams. The number and height of the quadrilateral openings are the variables to consider. According to test results, the presence of openings in the prestressed concrete hunched beam with multi-quadrilateral opening did not considerably affect their ultimate load capacity with respect to a contro
Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by de
... Show MoreApplications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreCatalytic reduction is considered an effective approach for the reduction of toxic organic pollutants from the environment, but finding an active catalyst is still a big challenge. Herein, Ag decorated CeO2 catalyst was synthesized through polyol reduction method and applied for catalytic reduction (conversion) of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). The Ag decorated CeO2 catalyst displayed an outstanding reduction activity with 99% conversion of 4-NP in 5 min with a 0.61 min−1 reaction rate (k). A number of structural characterization techniques were executed to investigate the influence of Ag on CeO2 and its effect on the catalytic conversion of 4-NP. The outstanding catalytic performances of the Ag-CeO2 catalyst can be assigne
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More