The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the level of liquid based on the imaging process technique (Edge Detection Approach). In order to achieve the aim of this work, Arduino board is used as the controller unit in the automatic operation of developed filling system. The developed automatic liquid filling system is designed to be not expensive compared to the other available filling systems on the markets. The system is also easy to operate and user-friendly,where only simple steps are required to operate the filling system or modify the working condition.It was found, based on results, that the Prewitt edge detection is the optimal method that should be applied to obtain high accuracy of results and quick response of developed system.
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreLiquid-liquid membrane extraction technique, pertraction, using three types of solvents (methyl isobutyl ketone, n-butyl acetate, and n-amyl acetate) was used for recovery of penicillin V from simulated fermentation broth under various operating conditions of pH value (4-6) for feed and (6-8) for receiver phase, time (0-40 min), and agitation speed (300-500 rpm) in a batch laboratory unit system. The optimum conditions for extraction were at pH of 4 for feed, and 8 for receiver phase, rotation speed of 500 rpm, time of 40 min, and solvent of MIBK as membrane, where more than 98% of penicillin was extracted.
This research is to take advantage of the performance capabilities which the piano has become famous with and transfer the impact of that advantage to the possibilities of playing the violin. The research aims to introduce the effect of using the piano on the development of the violinists' musical potential. The research, in its literature, focuses on the interpretation of the impact on the possibility of both instruments (piano and violin) in two main sections: the piano (its origin, potential and role in music) and the violin (its origin, potential and role in music). The procedures of the research consisted of presenting a special analysis of a questionnaire consisting of a number of questions presented by the researcher to her resear
... Show MoreTo produce Zinc Oxide NanoParticles, ZnO-NPs, different methods can be used. However, the utilization of Liquid-Phase Pulsed Laser Ablation, LP-PLA, methodology of three distinct environment of aqueous using pure zinc plate will be one of the approaches for this job. Thus, in this work, concentrates on the influence of the results after employing some changes on the environment in other words, the influence of the NPs size and/or the NPs availability/appearance. Cetyltrimethylammonium Bromide, CTAB, is one of the three surfactants that have been used in the water-based solution. That is, the Sodium Dodecyl Sulfate, SDS, besides the Distilled Water, DW, the three surfactants will be ready when the molarity of the DW is around 10− 3 M. Th
... Show MoreThis paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2
Massive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show More