It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems. The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and controlled to carry an object from one position to another. The movement of the system is controlled using three linear potentiometers, which are connected to an analog input of the microcontroller to feed the value of the pneumatic rod distance. To achieve the best path of the product moving, it is necessary to compare among several sequences. . The results show the sequences that compared with the reference under fixed speed, such as sequence that has been developed by combining two axes, and then the system path time has been reduced in taking the product from one place to another. Therefore, some factories need to reduce the sequences and thus reduce the time to transfer the product.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreA novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo
... Show MoreVoting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr
... Show MoreThe operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreThe middle Cenomanian – early Turonian Mishrif Formation, a major carbonate reservoir unit in southern Iraq, was studied using cuttings and core samples and wireline logs (gamma‐ray, density and sonic) from 66 wells at 15 oilfields. Depositional facies ranging from deep marine to tidal flat were recorded. Microfacies interpretations together with wireline log interpretations show that the formation is composed of transgressive and regressive hemicycles. The regressive hemicycles are interpreted to indicate the progradation of rudist lithosomes (highstand systems tract deposits) towards distal basinal locations such as the Kumait, Luhais and Abu Amood oilfield areas. Transgressive hemicycles (transgressive systems tract deposits)
... Show MoreThis paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show MoreThe brain's magnetic resonance imaging (MRI) is tasked with finding the pixels or voxels that establish where the brain is in a medical image The Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents. Next, the lines are separated into characters. In the Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents case of fonts with a fixed MRI width, the gaps are analyzed and split. Otherwise, a limited region above the baseline is analyzed, separated, and classified. The words with the lowest recognition score are split into further characters x until the result improves. If this does not improve the recognition s
... Show More