A friction stir spot welding (FSSW) process is an emerging solid state joining process in which the material that is being welded does not melt. In this investigation an attempt has been made to understand the effect of tool shoulder diameter on the mechanical properties of the joint. For this purpose four welding tools diameter (10,13, 16 and 19) mm at constant preheating time and plunging time were used to carry
out welding process. Effect of tool diameter on mechanical properties of welded joints was investigated using shear stress test and Microhardness of joint which welded was studied. Based on the stir welding experiments conducted in this study the results show that aluminum alloy (1200) can be welded using (FSSW) process with
The control charts are one of the scientific technical statistics tools that will be used to control of production and always contained from three lines central line and upper, lower lines to control quality of production and represents set of numbers so finally the operating productivity under control or nor than depending on the actual observations. Some times to calculating the control charts are not accurate and not confirming, therefore the Fuzzy Control Charts are using instead of Process Control Charts so this method is more sensitive, accurate and economically for assisting decision maker to control the operation system as early time. In this project will be used set data fr
... Show MoreS Khalifa E, AH Khalil I, N Adil A, AB Razan A…, 2009
BSTRACT: BACKGROUND: Acne vulgaris(AV)is chronic inflammatory disease of pilosebaceous unit of young people. Patients with acne with or with out scarring might differ in regard to their immunological background from those free from acne. OBJECTIVES: To evaluate the problem of facial AV especially patients with scarring and to determine the frequency of associated skin diseases and to be compared with acne free control. METHODS: A cross sectional randomized controlled epidemiological study was conducted from Oct.2005-Oct. 2006.Three hundred students from Basra University; 132 (44%) males and 168 (56%) females were enrolled, their ages ranged from 18-25 (20.9±1.8) years. They were divided into: Group A those free from acne (98 individuals),G
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreIn this study, the electro-hydraulic servo system for speed control of fixed displacement hydraulic motor using proportional valve and (PID) controller is investigated theoretically ,experimentally and simulation . The theoretical part includes the derivation of the nonlinear mathematical model equation of (valve – motor ) combination system and the derivation of the transfer function for the complete hydraulic system , the stability test of the system during the operation through the transfer function using MATLAB package
V7.1 have been done. An experimental part includes design and built hydraulic test rig and simple PID controller .The best PID gains have been calculated experimentally and simulation, speed control performance te