Design and construction of video extractor circuit require an understanding of several parameters, which include: Selector circuit, extracting circuit which contains sampling signal and multiplexing. At each radar pulse, the video signal is fed to one of the selector. The fast filter has a pass –band from 190 Hz to 1800 Hz. These frequencies correspond to targets having radial velocities laying between and 10 Kph and 200 Kph.Slow filter: 60 Hz to 230 Hz for radial velocities laying between 3.5 and 13 Kph.The video- extractor is organized in four PCB CG (A-B-C-D) each one having 16 selector. The sampling signal (ADS) (1-2-3-4) control the 4-line-to-16-line decoders. 8 multiplexers of 8 inputs each, are required for the multiplexing of the 64 selectors.
Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreImage compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of oth
... Show MoreThe digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreThe current study is unique in its emphasis on investigating design operation and concept from multiple scientific perspectives: including invention, technique, and design components. This research tends to study the methodology and creation of design process in a holistic manner so that the readers may grasp their characteristics and properties down to its minute epistemological detail. The investigation of the design concept is where the real groundwork and pressing need for the study begin. Creation and methodology are two primary concepts in relation to design these relationships can be formed in any design because of the various forces that act upon it. The primordial objective of this study is to evaluate the relationship betw
... Show MoreDirectional control valves are designed to control direction of flow, while actuators maintain required speeds and precise positions. Magnetorheological (MR) fluid is a controllable fluid. Utilizing the MR fluid properties, direct interface between magnetic fields and fluid power is possible, without the need for mechanical moving parts like spools. This study proposes a design of a four-way three-position MR directional control valve, presents a method of building, and explains the working principle of the valve. An analysis of the design and finite elements using finite element method of magnetism (FEMM) software was performed on each valve. The magnetic circuit of the MR valve was analyzed and the performance was simulated. The
... Show MorePurpose: The aim of this study was to gain insight into causes of time delays and cost overruns in a selection of thirty case projects in Iraq. Delay factors have been studied in many countries/contexts, but not much data exists from countries under the conditions characterizing Iraq during the last 10-15 years.Design/methodology/approach: A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. For the case of the study, the participants in the projects provided data about the projects through the data collection tool distributed through the questionnaire directed to them. Statistical data analysis was used to build statistical relationships between time and cost d
... Show More