In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poor settings of lighting, background, distance and camera resolution. Experimental results implied that the system was able to show high accuracies above 90% at very bad settings and around 99% at good settings, which assures that an inspection system with good performance can be built at low costs.
Vapor-liquid equilibrium data are presented for the binary systems n-hexane - 1-propanol, benzene - 1-propanol and n-hexane – benzene at 760 mm of mercury pressure. In addition ternary data are presented at selected compositions with respect to the 1-propanol in the 1-propanol, benzene, n-hexane system at 760 mmHg. The results indicate the relative volatility of n-hexane relative to benzene increases appreciably with addition of 1-propanol.
The present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition co
... Show MoreAmong the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreObjective: To identify the effect of the cube model on visual-spatial intelligence and learning the skill of spikinging in volleyball for female students, The researchers used the experimental method by designing two equivalent groups with pre- and post-measurements. Research methodology: The main research sample of (30) female students was selected from the research community represented by second-stage students in the College of Physical Education and Sports Sciences - University of Baghdad for the academic year (2024-2025). The sample was divided equally into two control and experimental groups. The researchers conducted the sample homogenization process and the equivalence process between the two groups in the variables of visua
... Show MoreInelastic transverse and longitudinal form factors of same parity have
been studied for B 10 nucleus in the frame work of the shell model for
many particles, by using He 4 as an inert core and the remaining
particles were distributed in 3 / 2 1 / 2 1p ,1p which form the model
space. The calculations of the present work based on the harmonic
oscillator potential with fixed size parameter (b). Here we use the
first order correction for the perturbation theory and the interaction
from Cohen-Kurath (CK). Adding the core-polarization effects to
form factors calculations gave a good agreement with the
experimental data. Calculations have been performed for the
transverse excited states of: (1 ,0 )at ( E 0.178M