Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptive approximation-based feedback linearization control (so-called adaptive computed torque control) combined with an anti-windup compensator is designed to track the desired COM produced by the high-level command. Along the length of the support sole, the ZMP with physical restrictions serves as the control input signal. The viability of the suggested controller is established using Lyapunov’s theory. The low-level control tracks the intended joint movements for a bipedal mechanism with flexible joints. We use two control strategies: position-based adaptive approximation control and cascaded position-torque adaptive approximation control (cascaded PTAAC). The interesting point is that the cascaded PTAAC can be extended to deal with variable impedance robotic joints by using the required velocity concept, including the desired velocity and terms related to control errors such as position, force, torque, or impedance errors if needed. A 6-link bipedal robot is used in simulation and validation experiments to demonstrate the viability of the suggested control structure.
Soil-structure frictional resistance is an important parameter in the design of many foundation systems. The soil-structure interface area is responsible for load transferring from the structure to the surrounding soil. The mobilized shaft resistance of axially loaded, long slender pile embedded in dense, dry sand is experimentally and numerically analyzed when subjected to pullout force. Experimental setup including an instrumented model pile while the finite element method is used as a numerical analysis tool. The hypoplasticity model is used to model the soil adjacent to and surrounding the pile by using ABAQUS FEA (6.17.1). The soil-structure interface behavior depends on many factors, but mainly on the interface soi
... Show MoreFlexible pavement design and analysis were carried out in the past with semi-experimental methods, using elastic characteristics of pavement layers. Due to the complex interferences between various layers and their time consumption, the traditional pavement analysis, and design methods were replaced with fast and powerful methods including the Finite Element Method (FEM) and the Discrete Element Method (DEM). FEM requires less computational power and is more appropriate for continuous environments. In this study, flexible pavement consisting of 5 layers (surface, binder, base, subbase, and subgrade) had been analyzed using FEM. The ABAQUS (6.14-2) software had been utilized to investigate the influence of the base layer depth on ver
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreA Multiple System Biometric System Based on ECG Data
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More