Designing machines and equipment for post-harvest operations of agricultural products requires information about their physical properties. The aim of the work was to evaluate the possibility of introducing a new approach to predict the moisture content in bean and corn seeds based on measuring their dimensions using image analysis using artificial neural networks (ANN). Experimental tests were carried out at three levels of wet basis moisture content of seeds: 9, 13 and 17%. The analysis of the results showed a direct relationship between the wet basis moisture content and the main dimensions of the seeds. Based on the statistical analysis of the seed material, it was shown that the characteristics examined have a normal or close to normal distribution, and the seed material used in the investigation is representative. Furthermore, the use of artificial neural networks to predict the wet basis moisture content of seeds based on changes in their dimensions has an efficiency of 82%. The results obtained from the method used in this work are very promising for predicting the moisture content.
Abstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreHollow core photonic bandgap fibers provide a new geometry for the realization and enhancement of many nonlinear optical effects. Such fibers offer novel guidance and dispersion properties that provide an advantage over conventional fibers for various applications. Dispersion, which expresses the variation with wavelength of the guided-mode group velocity, is one of the most important properties of optical fibers. Photonic crystal fibers (PCFs) offer much larger flexibility than conventional fibers with respect to tailoring of the dispersion curve. This is partly due to the large refractive-index contrast available in the silica/air microstructures, and partly due to the possibility of making complex refractive-index structure over the fibe
... Show MoreThis work investigates the utilization of waste papers (natural and industrial) i.e (citrus aurantium and papers A4) mortars containing specified contents 0.5%, 1%, 1.5% of waste papers were prepared and cured. Mechanical characteristics such as compressive and bending strengths, hardness and water absorption were determined for the mortars mixed with the waste papers and compared with those obtained from the pure mortars. Results showed that the addition of waste paper leads to increase the hardness to (69 - 68.5) shore D for (natural and industrial) wastes materials respectively comparing with pure specimen 66 shore D. The compressed strength of the mortar cement specimen cured for 28 days from 13 MPa to (17-18) MPa for (natural and in
... Show MoreThis paper develop conventional Runge-Kutta methods of order four and order five to solve ordinary differential equations with oscillating solutions. The new modified Runge-Kutta methods (MRK) contain the invalidation of phase lag, phase lag’s derivatives, and ampliï¬cation error. Numerical tests from their outcomes show the robustness and competence of the new methods compared to the well-known Runge-Kutta methods in the scientiï¬c literature.
Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreMalaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show More