In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreRefrigerant R134a has been widely utilized in automotive air conditioning systems (AACSs); R134a has a high global warming potential (GWP) of 1430 despite having zero ozone depletion potential (ODP). Coming refrigeration systems must include refrigerants with low GWP and zero ODP. The aim of this experimental study is to evaluate the thermal performance of an (AAC) with different values of compressor speeds, i.e., (1000, 1700, and 2400 rpm) and two thermal loads, i.e., (500 and 1000 Watt) with the absence and presence of liquid suction heat exchanger (LSHX) using R134a. The results showed that adding LSHX enhanced the COP cycle by 7.18%, 10.7%, and 3.09% for the first, second, and third speed, respectively, at 500 Watt, while the en
... Show MorePresupposition, which indicates a prior assumption, is a vital notion in both semantic and pragmatic disciplines. It refers to assumptions implicitly made by interlocutors, which are necessary for the correct interpretation of an utterance. Although there is a general agreement that presupposition is a universal property of Language, there are various propositions concerning its nature. However, this research work proposes that presupposition is a contextual term, thus, is more pragmatic than semantic in its nature.Although Semantics and Pragmatics are two distinct disciplines, they are interrelated and complementary to each other, since meaning proper involves both, and since there is no clear borderline between the two disciplines. How
... Show MoreThe current research aims to find out the role of transformational leadership in decision-making wise, to cope with the decline in some of the banking performance indicators as a result of the absence of the modern concept of the leadership of those so-called B (Transformational Leadership) and preventing benefit from the advantages in the banks, and I test the research on a sample of the Iraqi private banks through applied to a sample (77) Mdermvud and Associate Director and Advisor to the Chairman of the Department, the distributors (7) banks, and used the head of the questionnaire as a tool to collect data and information. For the purpose of access to the results, the research sought to test two hypotheses two main hypotheses sub pop
... Show MoreEfficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)