This paper presents a control system to make the robotic hand mimic human hand motion in real time and offline mode. The human hand tracking system is a wearable sensing arm (potentiometers) used to determine the position in space and to sense the grasping task of human hand. The maskable sensing arm was designed with same geometrical arrangement of robotic hand that needs to be controlled. The control software of a robot was implemented using Visual Basic and supported with graphical user interface (GUI). The control algorithm depends on joint to joint mapping method to match between the motions at each joint of portable sensing arm with corresponding joint of a robot in order to make the robot mimic the motion.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThis study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity.
Four bacterial strains were isolated from diesel contaminated soil samples. The isolates were identified by the Vitek 2 system, as Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae. The potential of biological surfactant production was tested using the Sigma 703D stand-alone tensiometer showed
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreMalaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreThe selection and assessment of single-photon detection modules is a crucial problem in satellite-based QKD systems. The system's overall efficiency, secure key rate and quantum bit error rate are all significantly influenced by single-photon detection modules. There is a knowledge gap about the practical performance of commercially available single-photon detectors because existing research frequently relies on theoretical characteristics. This paper introduces a study on the effect of the parameters of three commercial single photon detection modules from ID Quantique company: ID Qube, ID100, and ID281 on certain Bennett-Brassard 1984 protocol parameters such as secure key rate, mean photon number per pulse, quantum bit error rate
... Show MoreAmong the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show MoreA study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.
Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al
Reverse osmosis membrane desalination is one of the most significant water treatments that is used to offer freshwater. The aim of this research is to study the effect of controlling the value of the zeta potential on the suspended particles in the water and the proximity of the membrane surfaces in the colloidal solution, to keep the water stable electrically and disperse the colloidal particles. To achieve this aim, the experimental study was conducted in the Sanitary Engineering Laboratory, in the engineering college - University of Baghdad. Two systems were set up, one worked normally and the other worked by using the zeta rod placed before the reverse osmosis membrane. The results showed that the effect of the zeta rod increas
... Show More