Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system train and test part was applied to dust phenomena historical data. Its data has been collected through the Iraqi Meteorological Organization and Seismology (IMOS) raw dataset with 170237 of 17023 rows and 10 columns. The LSTM model achieved small time, computationally complexity of, and layers number while being effective and accurate for dust prediction. The simulation results reveal that the model's mean square error test reaches 0.12877 and Mean Absolute Error (MAE) test is 0.07411 at the same rates of learning and exact features values of vector in the dense layer, representing a neural network layer deeply is connected to the LSTM training proposed model. Finally, the model suggested enhances monitoring performance.
This paper represents an experimental study on the application of smart control represented by the use of the fuzzy logic controller. Two-link flexible manipulators that are used in airspace and military applications are made of flexible materials characterized by low frequency and damping ratio. To solve this problem, this paper proposes the use of smart materials (piezoelectric transducers), where each link is bonded with a pair of piezoelectric transducers that act as a sensor and another as an actuator. As the arm vibrates because of the movement generated by the motor, this voltage is controlled by a regulator inside the LABVIEW® 2020 software and sends the output control voltage to the piezoelectric actuator. Experimental results
... Show MoreAutism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this
... Show MoreThe subgrade soil is the foundation plate form of the roadway; it should sustain its structural characteristics throughout the design life of the roadway with minimal requirements for maintenance. When Gypseous soil is implemented in the construction of subgrade, problems regarding collapsibility and poor structural capacity usually occur when the subgrade came in touch with excess water. Asphalt stabilization could furnish a proper solution to such problems. In this investigation, an attempt has been made to monitor the variations in compressibility characteristics of asphalt stabilized subgrade soil subjected to 30 cycles of (freezing-thawing) and (heating-cooling). Data have been observed after each 10 cycles, and compared with that of r
... Show MoreDue to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreIn this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThis work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).