Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers. In this research, we pr
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDistribution of light intensity in the flat photobioreactor for microalgae cultivation as a step design for production of bio-renewable energy was addressed in the current study. Five sizes of bioreactors with specific distances from the main light source were adopted as independent variables in experiential design model. The results showed that the bioreactor’s location according to the light source, determines the nature of light intensity distribution in the reactor body. However, the cross-section area plays an important role in determining the suitable location of reactor to achieve required light homogeneity. This area could change even the expected response of the light passing through the reactor if Beer-Lambert's law is adopted.
... Show MoreThe aerodynamic characteristics of the forward swept wing aircraft have been studied theoretically and an experimentally investigation for the wake field generated by this configuration have been carried out. Low order panel method with the Dirichlet boundary condition have been used to solve the case of the steady, inviscid and compressible flow. Two different panel method techniques have been employed: the source-doublet and the doublet method. The thickness for the various components was considered in the study. Prandtl-Glauert similarity rule has been used to account for the compressibility effects. Experimentally, a model was manufactured from wood with body length (290mm) and main wing span was (204mm). The primary objective of th
... Show MoreSurfaces quality is one of the most specified customer requirements for machine parts. The major indication of surfaces quality on machined parts is surface roughness. The research aim is to study the cutting conditions and their effects on the surface roughness. This paper utilizes regression models to predict surface roughness over the machining time for variety of cutting conditions in turning. In the experimental part for turning, different types of materials (Aluminum alloy, Copper alloy, and Gray cast iron) were considered with different cutting speed ( ) and feed rate ( ). A mathematical Model depending on statistical-mathematical method between surface roughness (Rz ) and cutting condition ( , ) were derived, for the three materials
... Show MoreThe phenomenon of the social movements of researchers, based on the scope of their influence on political events, and the nature of the wide role played, and its ability to influence, through its activities and various activities and various. It has practiced its activities through new and non-traditional peaceful means, with clear slogans and specific objectives. And was able to mobilize activists from different strata of the Iraqi people, and its categories and social strata. As the demands focused on freedoms, rights, dignity and social justice
Purpose: Despite the high clinical accuracy of dynamic navigation, inherent sources of error exist. The purpose of this study was to improve the accuracy of dynamic navigated surgical procedures in the edentulous maxilla by identifying the optimal configuration of intra-oral points that results in the lowest possible registration error for direct clinical implementation. Materials and methods: Six different 4-area configurations were tested by 3 operators against positive and negative controls (8-areas and 3-areas, respectively) using a skull model. The two dynamic navigation systems (X-Guide® and NaviDent®) and the two registration methods (bone surface tracing and fiducial markers) produced four registration groups. The accuracy of the
... Show More