Preferred Language
Articles
/
NBh5hZgBVTCNdQwCB74T
Improving Barcode Vision Scanning Process using a Drone-based Tracking PID Controller for Warehouse in Industry 4.0
...Show More Authors

Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference between the planned and the real barcode image dimensions, and making immediate changes to the drone position to improve the process of detecting the potential barcode. The aforementioned procedure is implemented on the DJI Tello drone to verify the practical performance of the methodology introduced in this study. Results showed that drones can achieve remarkable barcode scanning performance by incorporating sophisticated computer vision technologies into PID controllers. PID computer vision algorithms are capable of analysing visual data acquired from the drone’s cameras and retrieving barcode information under a variety of situations, such as the size of the barcode, location of the barcode and noise of the warehouse environment.

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Egyptian Journal Of Chemistry
Application of UV-A light Operating Photoreactor for Green Degradation of Direct Blue 15 through the Photo-Fenton-like process: Effects and Box-Behnken Optimization
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Factors Affecting the Extraction Process
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Emissions Investigating of Carbon Dioxide Generated by the Iraqi Cement Industry
...Show More Authors
Abstract<p>The most used material in the world after water is concrete, which depends mainly on its manufacture of cement leading to the emission of carbon dioxide (CO<sub>2</sub>), flying dust, and other greenhouse gasses (GHGs) resulting in pollution of the atmosphere. The emission of CO<sub>2</sub> from cement production is approximately 5% of the global anthropogenic CO<sub>2</sub>. This research focuses on investigating the amount of CO<sub>2</sub> emission from the Iraqi General Cement Company plants includes the cement factories of Kirkuk, Al-Qa’em, Fallujah, and Kubaisa, using the GHGs Protocol Measures Program (specifically cement based-method).</p> ... Show More
View Publication
Scopus (20)
Crossref (14)
Scopus Crossref
Publication Date
Mon Oct 10 2022
Journal Name
International Journal Of Mathematics In Operational Research
Modelling time-series process of an agricultural crop production process by EWMA quality control chart
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Modern Sport
Visual Tracking and its Relationship to Dynamic Visual Acuity Among National Youth Foil Fencing Team Athletes
...Show More Authors

View Publication
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Regression Analysis as Analytical Procedure to Facilitate the Decision-Making Process in The Tax Audit: An Applied Research in the General Commission of Taxes
...Show More Authors

This research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r

... Show More
View Publication Preview PDF
Crossref