Preferred Language
Articles
/
PBfGLo4BVTCNdQwCCDyJ
Development of Wireless Controlling and Monitoring System for Robotic Hand Using Zigbee Protocol
...Show More Authors

Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control system, a new controller system was redesigned in this work by using Zigbee. It is a communication protocol for safety and economic data communication in an industrial field, where the wired communication is either expensive or difficult under physical and experimental conditions, such as the worker cannot recognize the error through the manufacturing process. Hence, this paper introduced a system that used microcontroller (AT89S52) with wireless devices (Zigbee) and sensors to control the robotic hand (EDARM ED-7100) and to monitor the information regarding the robot's parameter using WiFi technology. A mathematical model was derived through an empirical method to specify the robot's configuration changes. In this work, the ability of controlling system had increased, as well as hardware, while the necessities of other similar equipment for data communication were minimized. In addition, it presents the comparison of two controlling systems: using the Zigbee and without using it. Based from the experiment it can be safely concluded that the robotic arm's movement had followed a linear function.

Scopus Crossref
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Fractally Generated Microstrip Bandpass Filter Designs Based on Dual-Mode Square Ring Resonator for Wireless Communication Systems
...Show More Authors

A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2009
Journal Name
International Journal Of Applied Environmental Sciences
An expert System for Predicting the Effects of Noise Pollution on Grass Trimming Task Using Fuzzy Modeling
...Show More Authors

Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Nurses’ Knowledge and Practices concerning Physiotherapy Protocol at Intensive Care Units in AL-Nasiriyah City
...Show More Authors

Abstract:

Objective (s): This study aims to assess nurses' knowledge and practice regarding physiotherapy protocol at intensive care units

Methodology: descriptive cross-sectional study design executed at the ICU in the city hospitals of AL- for the time of 13th October/ 2021 to 7th April /2022. Questionnaire filled by 75 nurses who work in ICU who had chosen by non-probability (purposive) selection collected the data. Then the researcher used an observational checklist to evaluate nurses’ practice. The data was analyzed using descriptive statistics and SPSS.

Results: the study found a deficit in nurses’ knowledge and pra

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The reality of smart city development management in the comprehensive development plan for the city of Baghdad 2030
...Show More Authors

Abstract

Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref