Preferred Language
Articles
/
4BY874oBVTCNdQwCAahj
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the weld was completed according to the required working conditions and performance. The parts of the system work with compatible and consistent performances, with acceptable accuracy for tracking the line of the welding path.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
Israeli vision of Iran's nuclear program Under Iranian - US rapprochement
...Show More Authors

Israel is one of the countries most interested in Iran's nuclear program file, and the progress of negotiations between Iran and the six countries and will end it, as well as the nature of the relationship between Iran and the United States of America. Is determined by the Israeli vision of the nature of Iran's nuclear program Iran's policy toward Israel orientations, which does not recognize the existence of Israel. Israel, therefore, one of the countries pushing to prevent Iran from acquiring nuclear technology. However, those Israeli efforts did not succeed in achieving its objectives, the United States of America and European countries is well aware of the risk of stenosis on Iran, as well as the risks and the consequences of militar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Indian Journal Of Ecology
Study on major constraints and problems in transfer of technology by agricultural extension organization
...Show More Authors

Scopus (6)
Scopus
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Effects of Subsurface Water Retention Technology on Crop Coefficient and Crop Evapotranspiration of Eggplant
...Show More Authors

In this paper, the effects of subsurface water retention technology (SWRT) on crop coefficient (kc) and crop evapotranspiration (ETc) of eggplant were investigated in sandy loam soil. For this purpose, two treatments plot (with SWRT and without using SWRT) were adopted during 93 days of cultivation. The study was conducted in open field within Al-Fahamah Township, Baghdad, Iraq during summer growing season 2017. The accumulated ETc of eggplant was 403.3 and 515.2 mm for SWRT treatment and control plot, respectively by reduction percentage 21.7 %. The average values of ETc during the growing season were 4.3 and 5.5 mm/day, respectively. The crop coefficients value during the gro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
Fused and Modified Evolutionary Optimization of Multiple Intelligent Systems Using ANN, SVM approaches
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Intelligent Congestion Control of 5G Traffic in SDN using Dual-Spike Neural Network
...Show More Authors

Software Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Gas Lift for Improved Oil Recovery in a Middle East Field: A Genetic Algorithm Approach
...Show More Authors

This paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence Technology in the Field of Modern Forensic Evidence: Brain Fingerprinting as a Model
...Show More Authors

Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining

... Show More
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref