Preferred Language
Articles
/
ahifhZgBVTCNdQwCKb5y
Tools and Process of Defect Detection in Automated Manufacturing Systems
...Show More Authors

INTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound systems. METHODS: The utilization of AI and ML algorithms has gained significant traction in the realm of defect detection. This is attributed to their ability to process vast amounts of data and discern patterns that may have otherwise eluded detection. The aforementioned tools have the capability to anticipate potential flaws and implement pre-emptive measures to avert their occurrence. RESULTS: The detection of defects in automated manufacturing systems is a continuous process that necessitates meticulous observation and examination to guarantee prompt and effective identification and resolution of defects. CONCLUSION: The utilization of suitable tools and technologies is imperative for manufacturers to guarantee optimal production quality and operational success.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Science
Using of Remote Sensing Technique to Monitor The Status of The Plant and Change Detection for Three Different Periods in Western Region in Baghdad/ Iraq
...Show More Authors

Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Structural and optical properties of Fe- doped ZnO thin films prepared by Sol–Gel spin coating process and their photocatalytic activities
...Show More Authors

Pure and Fe-doped zinc oxide nanocrystalline films were prepared
via a sol–gel method using -
C for 2 h.
The thin films were prepared and characterized by X-ray diffraction
(XRD), atomic force microscopy (AFM), field emission scanning
electron microscopy (FE-SEM) and UV- visible spectroscopy. The
XRD results showed that ZnO has hexagonal wurtzite structure and
the Fe ions were well incorporated into the ZnO structure. As the Fe
level increased from 2 wt% to 8 wt%, the crystallite size reduced in
comparison with the pure ZnO. The transmittance spectra were then
recorded at wavelengths ranging from 300 nm to 1000 nm. The
optical band gap energy of spin-coated films also decreased as Fe
doping concentra

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
(The role of strategices to manage the human resources in enhancement the process of knowledge management : Field Search in the Ministry of Transportation)
...Show More Authors

The aims of the research is to know the role of strategic to manage the human resources in enhancement the process of knowledge management in the Ministry of Transportation , In addition to the effects occurred on outcomes for both the managers and practitioners .

For the purpose of achieving the objectives of the research , the researchers designed a questionnaire that included (40 Points for collecting the primary data from the sample of the research which contained (51) indiviluals. In light of that, the data was to collect and analyzed and hypotheses were tested by using the (SPSS) Program, and a number of statistical techniques was used to attain the goal of the research such as the means ,  Sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 03 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Quantitative detection and correlation of Epstein - Barr Virus in plasma with gingivitis and severity of chronic periodontitis by using real-time polymerase chain reaction technique
...Show More Authors

Background: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Jan 03 2026
Journal Name
Research On Crops
Effect of organic acid, amino acids and nano-fertilizer on growth, yield and nitrate concentration of lettuce plant under two farming systems
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus