According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through the conveyor belt motion. An optimal speed controlling mechanism of the conveyor belt is presented by detecting smartly the parts' number and weights using the vision sensor, where the latter will give sufficient visualization about the system. Then image processing will deliver the important data to ANN, which will optimally decide the best conveyor belt speed. This decided speed will achieve the aim of power saving in belt motion. The proposed controlling system will optimally switch the speed of the conveyor belt system to ON, OFF and idle status in order to minimize the consumption of energy in the conveyor belt. As the conveyor belt is fully loaded it moves at its maximum speed. But if the conveyor is partially loaded, the speed will be adjusted accordingly by the ANN. If no loading existed, the conveyor will be stopped. By this way, a very significant energy amount in addition to cost will be saved. The developed conveyor belt system will modernize industrial manufacturing lines, besides reducing energy consumption and cost and increasing the conveyor belts lifetime
The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreIn this study, zinc ferrite magnetic nanoparticles (ZnFe2O4, ZFO MNPs) were employed as a sorbent for the removal of oil spill from water surfaces. ZFO MNPs were synthesized via a sol-gel process and characterized by Fourier transform infrared spectroscopy (FTIR) and X-ray powder diffraction (XRD). Both the apparent density and magnetic force were determined. ZFO MNPs presented a considerable magnetic force (40.22 mN) and an adequate density (0.5287 g/cm3), which are important for the magnetic separation and flotation. Four oil samples (gasoline engine oil, crude oil, used motor oil and diesel engine oil) were used to investigate the gravimetric oil removal capability of ZFO MNPs. The oil sorption capacit
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language