Preferred Language
Articles
/
joe-669
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by MATLAB software have been transformed to UG-NX8 software to get the machining process simulation and G-code programs for the model, as well as a virtual machining process has been simulated to show the machining pitfalls, using CIMCO edit software. The sample has been machined using 3-axis vertical CNC machine. Finally, the sample has been measured using (CMM inspection) and it’s found that the average of error (0.144 mm).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (6)
Scopus
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Fri May 17 2013
Journal Name
Sensors
Evolution of Electroencephalogram Signal Analysis Techniques during Anesthesia
...Show More Authors

Biosignal analysis is one of the most important topics that researchers have tried to develop during the last century to understand numerous human diseases. Electroencephalograms (EEGs) are one of the techniques which provides an electrical representation of biosignals that reflect changes in the activity of the human brain. Monitoring the levels of anesthesia is a very important subject, which has been proposed to avoid both patient awareness caused by inadequate dosage of anesthetic drugs and excessive use of anesthesia during surgery. This article reviews the bases of these techniques and their development within the last decades and provides a synopsis of the relevant methodologies and algorithms that are used to analyze EEG sig

... Show More
View Publication
Scopus (52)
Crossref (55)
Scopus Clarivate Crossref
Publication Date
Wed May 31 2023
Journal Name
International Journal Of Advanced Technology And Engineering Exploration
Investigation of phase change characteristics for refrigerant R-134a flow in a double pipe heat exchanger with the use of thermal non-equilibrium model
...Show More Authors

Almost all thermal systems utilize some type of heat exchanger. In a lot of cases, evaporators are important for systems like organic Rankine cycle systems. Evaporators give a share in a large portion of the capital cost, and their cost is significantly attached to their size or transfer area. Open-cell metal foams with high porosity are taken into consideration to enhance thermal performance without increase the size of heat exchangers. Numerous researchers have tried to find a representation of the temperature distribution closer to reality due to the different properties between the liquid and solid phases. Evaporation heat transfer in an annular pipe of double pipe heat exchanger (DPHEX) filled with cooper foam is investigated numerical

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Key Engineering Materials
Push-Out Test of Steel-Concrete-Steel Composite Section for Pre-Installation and Post-Installation Techniques of Shear Connectors
...Show More Authors

Composite steel-concrete sections have a broad benefit through increasing structural strength as well as minimizing the self-loads. All past researches were concerned with pre-installed shear connectors (PRSC) in the manufacturing of composite sections. A new fabrication technique for steel-concrete-steel composite sections were presented in the current study by the post-installation shear connectors (POSC) passed-through an embedded polymerizing vinyl chloride (PVC) pipes. The performance of normal strength concrete prisms with a specified strength of 32 MPa connected to square steel tubes (SST) was investigated. Six specimens were fabricated in both methodologies, PRSC and POSC were experimentally tested by Push-out test. The spac

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Form a proposal to audit the mutual operations with related parties program in accordance with international standards: Proposal pattern
...Show More Authors

The relationships between the related parties constitute a normal feature of trading and business processes. Entities may perform parts of their activities through subsidiary entities, joint ventures and associate entities. In these cases, the entity has the ability to influence the financial and operating policies of the investee through control, joint control or significant influence,  So could affect established knowledge of transactions and balances outstanding, including commitments, and relationships with related to the evaluation of its operations by users of financial statements, including the risks and opportunities facing the entity assess the parties. So research has gained importance of the importance of the availability

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Item Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them
...Show More Authors

Item Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them Mohammad moqasqas Haifa T. Albokai Assistant Professor of Measurement and Evaluation Associate Professor of Measurement and Evaluation College of Education, Taibah University The aim of this study was to study the item difficulty and item discrimination of the SCAT (advance form) with CTT, and IRT, and to study the correlation among them. To do this, the researchers used the data of their previous study, which conducted in (2011). It consisted of (3943) subject. Then, they used two-statistical programs (TAP, Bilog-MG-3) to obtain the item

... Show More
View Publication Preview PDF