In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint repulsive force and the off-sensors attractive force. These secondary forces and modified primary forces are merged to overcomethe drawbacks like dead ends and U shape traps. The proposed algorithm acquirs information of unknown environment by collecting the readings of five infrared sensors with detecting range of 0.8 m. The proposed algorithm is applied on two different environments also it is compared with another algorithm. The simulation and experimental results confirm that the proposed algorithm always converges to the desired target. In addition, the performance of algorithm is well and meets the requirements in terms of saved time and computational resources.
The cytotoxic effect of catechol was examined in two human cancer cell lines, Epidermoid larynx carcinoma (Hep- 2), Cerebral glioblastoma multiforme (AMGM-5) and Murine mammary adenocarcinomacell (AMN3) treated with half concentrations of catechol (1000, 500, 250, 125, 62.5 and 32.25 μM) for 72 hr. The get hold of results showed catechol have a toxic effect of the cell viability of three types of cell lines after 72h of exposure, the toxicity was dependent on catechol concentrations and/or autoxidation for quinines formation, there were a marked decreased of cell viability in a dose dependent manner in all cell line types. Inhibition concentration of catechol for 50% of cell viability (IC50) were calculated, they were at 581.5 μM, 478 μM
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Simulated annealing (SA) has been an effective means that can address difficulties related to optimization problems. is now a common discipline for research with several productive applications such as production planning. Due to the fact that aggregate production planning (APP) is one of the most considerable problems in production planning, in this paper, we present multi-objective linear programming model for APP and optimized by . During the course of optimizing for the APP problem, it uncovered that the capability of was inadequate and its performance was substandard, particularly for a sizable controlled problem with many decision variables and plenty of constraints. Since this algorithm works sequentially then the current state wi
... Show MoreThis research came with the aim of showing the impact of governance mechanisms on tax avoidance practices, and in light of this, the financial data of the joint stock companies (industrial, service, agricultural, and hotels) listed in the Iraq Stock Exchange amounting to (35) companies were collected during the period (2009-2020). Through the financial reports published on the market website, multiple linear regression analysis was used as a tool to study the relationship between variables, and (Eviews 12) program was used for analysis and hypothesis testing. To achieve the objectives of the research,(administrative ownership, board size, board independence, women's membership) was adopted as an indicator of the dimensions of governance, an
... Show MoreThe majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value <0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, tempe
تعرف مستحضرات المعزز الحيوي على انها مكملات غذائية من البكتيريا الحية أو الخمائر يعتقد أنها ذات تأثيرات صحية للكائن المضيف، وحسب التعريف المعتمد حالياً من منظمة الأغذية والزراعة ومنظمة الصحة العالمية
This study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively
... Show MoreThe Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show More