Preferred Language
Articles
/
4BY874oBVTCNdQwCAahj
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the weld was completed according to the required working conditions and performance. The parts of the system work with compatible and consistent performances, with acceptable accuracy for tracking the line of the welding path.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri Mar 10 2023
Journal Name
Mathematics
Hamilton–Jacobi Inequality Adaptive Robust Learning Tracking Controller of Wearable Robotic Knee System
...Show More Authors

A Wearable Robotic Knee (WRK) is a mobile device designed to assist disabled individuals in moving freely in undefined environments without external support. An advanced controller is required to track the output trajectory of a WRK device in order to resolve uncertainties that are caused by modeling errors and external disturbances. During the performance of a task, disturbances are caused by changes in the external load and dynamic work conditions, such as by holding weights while performing the task. The aim of this study is to address these issues and enhance the performance of the output trajectory tracking goal using an adaptive robust controller based on the Radial Basis Function (RBF) Neural Network (NN) system and Hamilton

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Development of Wireless Controlling and Monitoring System for Robotic Hand Using Zigbee Protocol
...Show More Authors

Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
Israeli vision of Iran's nuclear program Under Iranian - US rapprochement
...Show More Authors

Israel is one of the countries most interested in Iran's nuclear program file, and the progress of negotiations between Iran and the six countries and will end it, as well as the nature of the relationship between Iran and the United States of America. Is determined by the Israeli vision of the nature of Iran's nuclear program Iran's policy toward Israel orientations, which does not recognize the existence of Israel. Israel, therefore, one of the countries pushing to prevent Iran from acquiring nuclear technology. However, those Israeli efforts did not succeed in achieving its objectives, the United States of America and European countries is well aware of the risk of stenosis on Iran, as well as the risks and the consequences of militar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Intellectual vision of the Justice and Development Party in Turkey
...Show More Authors

شهد العالم مع بداية القرن الحادي والعشرين تدشين مرحلة جديدة من التطور شملت مختلف الميادين لاسيما في مجال التطورات العلمية والثورة المعلوماتية.. كما إن مسار الديمقراطية في بعض دول العالم يصبح سالكا خاصة في تركيا, فمنذ اواسط الثمانينيات من القرن الماضي فتح المجال السياسي امام قوى كانت مسحوقة ومهمشة, ويكاد ان لا يكون لها وجود في الحياة السياسية للنزول الى ساحة العمل السياسي اسوة ببقية القوى ا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Pioneering and Growth of Plastic vision data in Modern Art
...Show More Authors

The achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The ownership in economic thought and religious postural Contemporary Vision
...Show More Authors

Since the property in Islam is based on the principle of succession , "which made ​​you Khalaúv land and raise yourselves above some degree of Iblukm with Atakm The Lord of the fast punishment and it is Forgiving, Merciful " [cattle : 165 ] and human only Mstkhalaf where " God promised you who believe and do good deeds for Istkhalvenhm Normans in the ground as those before them " [Nur : 55 ] , considering that King God alone any talk about having ownership in Islam in the contemporary sense of ownership , containing three rights are:

1- right to dispose of the right of usufruct tenure

2-The concept is ambiguous as long as that man Mstkhalaf does not have the right to dispose

... Show More
View Publication Preview PDF
Crossref