Preferred Language
Articles
/
alkej-671
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of python libraries such as PAHO to make the connection between devices.

 Present sensor value (A sensor called DHT sensor used in this research to measure temperature and humidity) on cloud to help operator make decision. This technology was used to eliminate paper work, provide a real time monitoring of machines and give the upper level of management to take their decisions about the products and its status to begin the shipping to the costumer

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Indoor Positioning and Monitoring System Using Smartphone and WLAN (IPMS)
...Show More Authors

 

Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 15 2016
Journal Name
The Iraqi Journal For Mechanical And Material Engineering
MACHINE VISION APPLICATION IN MANUFACTURING: INSPECTION OF DIMENSIONS
...Show More Authors

Computers have been used for numerous applications involving the automatic or semiautomatic recognition of patterns in image. Advanced manufacturing system requires automated inspection and test method to increase production and yield best quality of product. Methods are available today is machine vision. Machine vision systems are widely used today in the manufacturing industry for inspection and sorting application. The objective of this paper is to apply machine vision technology for measuring geometric dimension of an automotive part. Vision system usually requires reprogramming or parameterization of software when it has to be configured for a part or product. A web camera used to capture an image of an automotive part that has been ch

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
The effectiveness of the manufacturing industry in Iraq
...Show More Authors

The manufacturing industry in Iraq has faced, during the time stages, several obstacles that have had devastating effects on the Iraqi economy. These obstacles are represented by political events and wars that have led to the depletion of most human and material resources and the suspension of most vital industrial facilities from working, And the occurrence of this major deviation in the process of economic development, For the same reasons, the contributions of the manufacturing sector to the gross domestic product varied fluctuatingly, indicating instability in the growth rates of this sector, On the other hand, the supremacy of the belief that the dominance of oil resources as a main source for creating economic growth and achieving a h

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Form factor calculations for some light nuclei in the framework of electron scattering
...Show More Authors

View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Intelligent Systems And Applications In Engineering
Artificial Intelligence Based Statistical Process Control for Monitoring and Quality Control of Water Resources: A Complete Digital Solution
...Show More Authors

Scopus (3)
Scopus
Publication Date
Fri Aug 05 2022
Journal Name
Spectroscopy Europe
Raman spectroscopy analysis for monitoring of chemical composition of aspirin after exposure to plasma flame
...Show More Authors

A Raman spectroscopy method was optimised to examine the chemical changes of aspirin tablets after interaction with helium temperatures. Several aspirin tablets were exposed to plasma-assisted desorption ionisation flame for different times (10, 30, 50, 60, 180 and 300s) and then analysed by Raman spectroscopy using optimal conditions. The changes in chemistry between exposed and fresh (without exposure to plasma) tablets were compared. The vibrational peaks of the aspirin molecule in the Raman spectrum were identified by checking the peak position. The results showed clear spectra with increases in intensity of vibrational peaks until 30s, whereas no spectra were measured for the exposed tablets to plasma flame after 50s. It can, the

... Show More
Preview PDF
Scopus (6)
Scopus
Publication Date
Sat Jan 14 2023
Journal Name
Cogent Engineering
C. B interrupt duty reduction based controlling TRV and symmetrical breaking current
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref