This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosis system is developed to determine the status of the motor without the need for an expert. This system is based on artificial neural network (ANN) and it is characterized by speed and accuracy and the ability to detect more than one fault at the same time.
This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl
... Show MoreThe present study aimed to examine the concordance between FISH/CISH techniques for assessment of amplification of her2neu gene in Iraqi breast carcinoma patients. Seventy four (74) Iraqi breast cancer patients were involved at the study from the Histopathology Department at the Central Public Health Laboratory in Bagdad, Iraq. Amplification of HER2neu was detected in (33.8%) by fluorescence in situ hybridization and (13.51%) showed high amplification by chromogenic in situ hybridization and (32.43%) showed low amplification. The results of chromogenic in situ hybridization were significantly correlated with the results of two-color fluorescence in situ hybridization with the same tumors. In addition, the study involved the correlation betw
... Show MoreBackground: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and
... Show MoreThe vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
To evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen va
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show Morethe study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More