Grain size and shape are important yield indicators. A hint for reexamining the visual markers of grain weight can be found in the wheat grain width. A digital vernier caliper is used to measure length, width, and thickness. The data consisted of 1296 wheat grains, with measurements for each grain. In this data set, the average weight (We) of the twenty-four grains was measured and recorded. To determine measure of the length (L), width (W), thickness (T), weight (We), and volume(V). These features were manipulated to develop two mathematical models that were passed on to the multiple regression models. The results of the weight model demonstrated that the length and width of the grains were significantly different
In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreKnowledge of the mineralogical composition of a petroleum reservoir's formation is crucial for the petrophysical evaluation of the reservoir. The Mishrif formation, which is prevalent in the Middle East, is renowned for its mineralogical complexity. Multi-mineral inversion, which combines multiple logs and inversions for multiple minerals at once, can make it easier to figure out what minerals are in the Mishrif Formation. This method could help identify minerals better and give more information about the minerals that make up the formation. In this study, an error model is used to find a link between the measurements of the tools and the petrophysical parameters. An error minimization procedure is subsequently applied to determine
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio
... Show MoreRutting in asphalt mixtures is a very common type of distress. It occurs due to the heavy load applied and slow movement of traffic. Rutting needs to be predicted to avoid major deformation to the pavement. A simple linear viscous method is used in this paper to predict the rutting in asphalt mixtures by using a multi-layer linear computer programme (BISAR). The material properties were derived from the Repeated Load Axial Test (RLAT) and represented by a strain-dependent axial viscosity. The axial viscosity was used in an incremental multi-layer linear viscous analysis to calculate the deformation rate during each increment, and therefore the overall development of rutting. The method has been applied for six mixtures and at different tem
... Show MoreVerrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show More