SCADA is the technology that allows the operator to gather data from one or more various facilities and to send control instructions to those facilities. This paper represents an adaptable and low cost SCADA system for a particular sugar manufacturing process, by using Programmable Logic Controls (Siemens s7-1200, 1214Dc/ Dc/ Rly). The system will control and monitor the laboratory production line chose from sugar industry. The project comprises of two sections the first one is the hardware section that has been designed, and built using components suitable for making it for laboratory purposes, and the second section was the software as the PLC programming, designing the HMI, creating alarms and trending system. The system will have two HMI screens according to the two operating states of system (Automatic and Manual), the operator can choose between them by a selector switch, this method helps the operators when fixing a failure and wanting to check it without operating all the process. The result has accomplished the goals of controlling, the parameters (temperature, flow, humidity) were monitored, failure was detected by an alarm.
In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreIn order to understand the effect of the number of piles (N), the history response of dynamic pile load in piled raft system and deflection time history of piled raft under repeated impact load applied on the center of piled raft resting on loose sand, laboratory model tests were conducted on small-scale models. The results of experimental work are found to be dynamic load increase with increase height of drop, the measured repeated dynamic load time history on the center of piled raft was close approximately to three a half sine wave shape with small duration in about (0.015 Sec). The maximum peak of impact loads occurs in pile and deflection time history occur after at the time of the peak repeated impact loads, dynamic pile load
... Show MoreAbstract A descriptive study using evaluation technique was carried at the health organizations concerning STIs/HIV/AIDS, mainly the AIDS Researches and Studies Center in Baghdad and many of the AIDS sections in the Health Directorates in the Governorates throughout the period of May 15th , 2003 through September 30th, 2003( to describe the surveillance system for the period 1993 through 2002). The study aimed to describe the STIs/HIV/AIDS surveillance system in Iraq. System evaluation questionnaire was adopted from WHO and developed for the purpose of this study. Content validity of questionnaire was establis
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More