Preferred Language
Articles
/
alkej-671
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of python libraries such as PAHO to make the connection between devices.

 Present sensor value (A sensor called DHT sensor used in this research to measure temperature and humidity) on cloud to help operator make decision. This technology was used to eliminate paper work, provide a real time monitoring of machines and give the upper level of management to take their decisions about the products and its status to begin the shipping to the costumer

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Updating the uniform accounting system in Iraq for installment sales transactions framework
...Show More Authors

Due to the intensity of competition between economic units that run the trade in durable goods had to pay a lot of these companies to follow the new selling methods aimed at attracting customers to be able to increase its sales and thereby increase their profits ,  these methods are installment sales, which had been in great demand by the customers with limited income, who provides them with the possibility of possession and use of such goods and to postpone the full amount of the payment to the seller, This transaction sales have grown even became installment sales system at the present time of the common types of sales transactions and deployed a lot in our environment and in many sectors of the market, and in some cases m

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
PDCNN: FRAMEWORK for Potato Diseases Classification Based on Feed Foreword Neural Network
...Show More Authors

         The economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work  is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Controlling of Robot Hand by Using Microcontroller with Visual Basic
...Show More Authors

The robot arm is the most popular robotic form used in industry. Thus, it is crucial to make a system programming which could controlled the movement of each part in the industrial robot to make it works properly. One of the simplest models of the robot arm is EDARM ED-7100 which has a controller to control the movement of the robot arm manually. In this study, the robot controller has been redesigned in order to improve this robot's function. The new controller system used AT89S52 microcontroller which has wire connected to the robot hand. A function has been added with this controller to improve the system of controlling and becomes better than the previous system (only manually). The functions of the new system include three mo

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Evaluation of the Performance of Online GPS/GNSS Data Processing Services for Monitoring the Land Deformations and Movements
...Show More Authors

In recent years, the Global Navigation Satellite Services (GNSS) technology has been frequently employed for monitoring the Earth crust deformation and movement. Such applications necessitate high positional accuracy that can be achieved through processing GPS/GNSS data with scientific software such as BERENSE, GAMIT, and GIPSY-OSIS. Nevertheless, these scientific softwares are sophisticated and have not been published as free open source software. Therefore, this study has been conducted to evaluate an alternative solution, GNSS online processing services, which may obtain this privilege freely. In this study, eight years of GNSS raw data for TEHN station, which located in Iran, have been downloaded from UNAVCO website

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Manufacturing an Organic Solar Cell and Comparing with Different Dyes
...Show More Authors

A solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
2018 Detroit, Michigan July 29 - August 1, 2018
Design and validation of an electronic data logging systems (CAN Bus) for monitoring machinery performance and management- Planting application
...Show More Authors

View Publication
Scopus (6)
Scopus Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
D.C conductivity of In2O3: SnO2 thin films and manufacturing of gas sensor
...Show More Authors

Compounds were prepared from In2O3 doped SnO2 with different doping ratio by mixing and sintering at 1000oC. Pulsed Laser Deposition PLD was used to deposit thin films of different doping ratio In2O3: SnO2 (0, 1, 3, 5, 7 and 9 % wt.) on glass and p-type wafer Si(111) substrates at ambient temperature under vacuum of 10-3 bar thickness of ~100nm. X-ray diffraction and atomic force microscopy were used to examine the structural type, grain size and morphology of the prepared thin films. The results show the structures of thin films was also polycrystalline, and the predominate peaks are identical with standard cards ITO. On the other side the prepared thin films declared a reduction of degree of crystallinity with the increase of doping ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The interference between effects of Adhatoda vasica (Nees) extracts and Bacillus thuringiensis (Berliner) for controlling population of fig moth, Ephestia cautella Walker
...Show More Authors

The activity of Adhatoda vasica crude plants extracts against B.thuringiensis bacteria was determined by MIC test and sensitivity test which showed no response of this type of bacteria against extracts .The interference between the effect of hot and cold aqueous extracts and Bacillus thuringiensis bacteria for controlling the population of fig moth when males and females released before treatment under control condithion was gave a highly percentage of larval mortality which reached to 100% in (B.t. + hot aqueous extract ) and 97.3% in (B.t + coldaqueous extract ) after two weeks of treatment when concentration of 50% of aqueous extracts and 5×10?1of Bacillus thuringiensis bacteria but when the insect (males & females) released after

... Show More
View Publication Preview PDF
Crossref