Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers. In this research, we present an adopted approach based on convolutional neural networks to design a system for quality inspection with high level of accuracy and low cost. The system is designed using transfer learning to transfer layers from a previously trained model and a fully connected neural network to classify the product’s condition into healthy or damaged. Helical gears were used as the inspected object and three cameras with differing resolutions were used to evaluate the system with colored and grayscale images. Experimental results showed high accuracy levels with colored images and even higher accuracies with grayscale images at every resolution, emphasizing the ability to build an inspection system at low costs, ease of construction and automatic extraction of image features.
In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe aim of the present research is to identify the test wisdom and the engagement with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and whether students are employee or non-employee. The study also attempts to identify the relationship between the test wisdom and the engagement with learning and psychological tension. The research sample consisted of (75) postgraduate students randomly selected from college of Education. The researcher applied the test–wisdom of (Mellman & Ebel) and the scale of engagement with learning preparation by (Al-zaabi 2013). In addition, the researcher used the list of the psychological stress of (Abu
... Show MoreThe current research aims at: - Identifying the role played by the leadership in empowerment and organizational learning abilities and their reflection on the knowledge capital, and the extent to which these concepts can be applied effectively at Wasit University. The problem of research .... In a series of questions: The most important is that the dimensions leadership empowerment and distance learning organizational capacity correlation relationship and impact and significant statistical significance with the capital knowledge.
To understand the nature of the relationship and the impact between the variables, leadership was adopted by empowerment as the fir
... Show MoreNowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe research is summarized in the construction of a mathematical model using the most common methods in the science of Operations Research, which are the models of transportation and linear programming to find the best solution to the problem of the high cost of hajj in Iraq, and this is done by reaching the optimum number of pilgrims traveling through both land ports and the number Ideal for passengers traveling through airports by Iraqi Airways, instead of relying on the personal experience of the decision-maker in Hajj and Umrah Authority by identifying the best port for pilgrim's travel, which can tolerate right or wrong, has been based on scientific methods of Operations Research, the researcher built two mathematical models
... Show MoreAbstract\
In this research we built a mathematical model of the transportation problem for data of General Company for Grain Under the environment of variable demand ,and situations of incapableness to determining the supply required quantities as a result of economic and commercial reasons, also restrict flow of grain amounts was specified to a known level by the decision makers to ensure that the stock of reserves for emergency situations that face the company from decrease, or non-arrival of the amount of grain to silos , also it took the capabilities of the tanker into consideration and the grain have been restricted to avoid shortages and lack of processing capability, Function has been adopted
... Show More