Preferred Language
Articles
/
ehbD1okBVTCNdQwCa43l
MACHINE VISION APPLICATION IN MANUFACTURING: INSPECTION OF DIMENSIONS
...Show More Authors

Computers have been used for numerous applications involving the automatic or semiautomatic recognition of patterns in image. Advanced manufacturing system requires automated inspection and test method to increase production and yield best quality of product. Methods are available today is machine vision. Machine vision systems are widely used today in the manufacturing industry for inspection and sorting application. The objective of this paper is to apply machine vision technology for measuring geometric dimension of an automotive part. Vision system usually requires reprogramming or parameterization of software when it has to be configured for a part or product. A web camera used to capture an image of an automotive part that has been chosen. In the machine vision, Matlab software is used to develop an algorithm to measure a geometric dimension of the part. The measurement system has been calibrated using gauge block. This work considers the factor influencing parameters on accuracy and precision of calibration as the pixels were used to perform the unit of measurement. This measurement has been performed by the conversion through the equation of the image processing. Formulation of the calibration is important from unit in pixel to mm taking into account the perfective effect of the camera view. Finally the measurement system has been tested for accuracy and precision.

Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Autoantibody Profile in Systemic Lupus Erythematosus Patients
...Show More Authors
Abstract<p>Systemic lupus erythematosus (SLE) is an autoimmune disease, in which the etiology is not well-understood; however, interactions between environmental and genetic factors in predisposed individuals have been recognized. As a consequence, immunological alternations occur and immune cells are involved, especially T and B lymphocytes that are activated to produce different immune components. Among these components are autoantibodies that react with self-antigens aside from non-self-antigens due to the proposed theory of molecular mimicry. Accordingly, the current study was designed to examine the profile of different autoantibodies in SLE patients by using the indirect membrane based enzyme immunoassay </p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 17 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
Line and continuum variability in active galaxies
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Sep 19 2019
Journal Name
Engineering, Construction And Architectural Management
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors

... Show More
View Publication
Scopus (61)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Discourse Deixis in the American Political Speeches
...Show More Authors

 The feature that prevails in spoken political discourse - especially with regards to the fact
that it is otherwise used in the written one - is relatively high degree of formality. It is then just
logical that formality is usually accompanied with more polite forms and higher degree of
impersonality. Such discourse is characterized by the choice of specific vocabulary and syntactic
structures as well. However, there are some tendencies to bring political speech nearer to the
everyday discourse and that is why political speeches have been becoming more informal and
personal. Like any other types of discourse, the American political speeches are loaded with
deictic expressions that form an essential complementary

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Peace Indicating Words in Pre- Islamic Poetry
...Show More Authors

In pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
The Tohoku Journal Of Experimental Medicine
Neonatal Seizures in Iraq: Cause and Outcome
...Show More Authors

View Publication
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Sat Jun 10 2023
Journal Name
الجمعية العراقية للعلوم السياسية
Ethnofideralism: A Study in the Belgian Experience
...Show More Authors

Belgium is one of the countries that headed towards federalism through a peaceful transition, and over a few decades the country has witnessed deep transformations in its institutions, from a unified and central state in the early nineteenth century to a federal union, regional operations began since 1970 up and constitutionally established its diversity Linguistic and regional, the so -called "state reforms" have been implemented, which led to the emergence of political repercussions. The country has suffered about two decades ago, which caused many national governments that are considered to be among the Luxor in the modern political history of Belgium, However, institutional reforms to achieve the stability of the political system began,

... Show More
View Publication
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Processors Functional Design In Public Interior Spaces
...Show More Authors

It is general known that any design in various fields such as the interior design in the field of spaces interior for the public and specific buildings that is concern about the use of humans resident , as well as other considerations relating to the organization of design elements and lines of locomotors activity and the validity of appropriate receiving to provide comfort and achieve the requirements of the position in the space of restaurants field of research.
The researcher choose the title of this study (processors design career in public spaces), the analytical study of the spaces of restaurants, as one of the public spaces that are running in their general environment of people in various strata , ages and other levels , whic

... Show More
View Publication Preview PDF
Crossref