Preferred Language
Articles
/
alkej-692
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built to perform the proposed algorithm which implemented using a suggested case studies with cylinder and dome shape. The resulted point cloud from application the proposed algorithm and result of surface fitting for the case studies has been proved the proficiency of the proposed chord angle algorithm in pre-processing of data points and clean the point cloud, where the percent of data which was ignored as noisy data points according to proposed chord angle algorithm was arrived to (81.52%) and (75.01%)of total number of data points in point cloud for first and second case study respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (51)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Medical Journal
Surface analysis of the PEKK coating on the cp ti implant using laser technique
...Show More Authors

Objective: Evaluation of the poly ether keton keton polymer (PEKK) coating material on the commercial pure titanium disks (CP Ti) with or without laser surface structuring. Design: In vitro experimental study of PEKK polymer coated material on the CP Ti disks with or without laser surface structuring. Materials and methods: coating the surface of the commercial pure titanium (CP Ti) disks with PEKK polymer was performed via using frictional mode CO2 laser, then the samples disks analyzed by using FESEM. Results: the FESEM reveal good adherence and distribution of the PEKK coated material over the CP Ti substrate by using the frictional mode CO2 laser at 2 watt and 6 ms pulse duration. Conclusion: the frictional mode CO2 laser considered an

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Technical Treatment for Pottery Body by (Kintsugi) Technique in Japanese Pottery – Analytic Study
...Show More Authors

The aesthetic and technical expertise help  in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and  expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting  its active presence in life, cherishing it  even when it  breaks  or get damaged   by employing techniques that are originated  from  the Japanese environment.

                       The research problem is to study how ( Kintsugi) technique and similar techniques are used to create  new rebirths of pottery piec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An Improved Cuckoo Search Algorithm for Maximizing the Coverage Range of Wireless Sensor Networks
...Show More Authors

The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying the target costing technique on rationalizing pricing decisions in economic units
...Show More Authors

                The research aims to highlight the role played by the target costing technique as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information and scientific foundations it provides in the allocation of indirect costs and the accuracy in measuring the cost from the start of the project planning process up to the production process and indicating the extent of its impact on decisions Pricing in a way that contributes to the rationalization of pricing decisions in economic units in the light of intense competition and the multiplicity of alternatives.

View Publication Preview PDF