Preferred Language
Articles
/
alkej-442
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and construction, and then a successful and guaranteed path from a start to goal configuration has been obtained without any collision probability. The results had been achieved by (Matlab R2015a) software, which run on Intel (R) Core (TM) i3-3120M CPU.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 24 2022
Journal Name
Journal Of Tikrit University For Humanities
A Training Program Based on Integrating Future Thinking Skills and Classroom Interaction Patterns for Mathematics Teachers and Providing Their Students with Creative Solution Skills
...Show More Authors

The research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of tongue space area in a sample of Iraqi adults with class I dental and skeletal pattern
...Show More Authors

Background: Lateral cephalometric radiography is commonly used as a standard tool in orthodontic assessment and treatment planning. This study aimed to determine the tongue and surrounding space area in a sample of Iraqi adults with class I dental and skeletal pattern. Materials and methods: The study included thirty healthy subjects (15 males and 15 females) with an age ranged between 23-34 years and class I dental and skeletal pattern with no history of any sleep related disorders. The assessed cephalometric measurement included length and height of the tongue and position of hyoid bone from cervical line. Descriptive statistics were obtained for the data. Genders difference was evaluated by independent sample t-test. Results: There wer

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 18 2022
Journal Name
Journal Of The College Of Basic Education
A (k,ℓ) Span in Three Dimensional Projective Space PG(3,p) Over Galois Field where p=4
...Show More Authors

الغرض من هذا العمل هو دراسة الفضاء الإسقاطي ثلاثي الأبعاد PG (3، P) حيث p = 4 باستخدام المعادلات الجبرية وجدنا النقاط والخطوط والمستويات وفي هذا الفضاء نبني (k، ℓ) -span وهي مجموعة من خطوط k لا يتقاطع اثنان منها. نثبت أن الحد الأقصى للكمال (k، ℓ) -span في PG (3،4) هو (17، ℓ) -span ، وهو ما يساوي جميع نقاط المساحة التي تسمى السبريد.

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Pharmaceutical Sciences And Research
Protective Effects of Quercetin on Lipopolysaccharide -Induced Inflammation and Lipid Peroxidation in BALB/c Male Mice
...Show More Authors

In the resent years, there is a robust scientific interest in discovery of new anti-septic and anti-oxidant naturally products with no/or limited side effects. The current study aimed to investigate the protective role of the quercetin on inflammations induced by lipopolysaccharide (LPS) in male mice A number of criteria included i.e. liver and spleen index and IL-6 and IL1-β cytokines level in spleen homogenate were considered. Sixty male mice (8-9 week age) was divided into six groups and treated for 5 days as the following: the first group represented control, the second and third group were injected with 5, 10 mg/kg b.w doses of quercetin respectively. While the fourth and fifth groups were co-treatment with (5, 10 mg/kg b.w.) intraper

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
Effect of benzyl adenine and meta-topolin on in vitro propagation of C-35 citrange rootstocks
...Show More Authors

This study was carried out in Plant Tissue Culture Labs, College of Agricultural Engineering Sciences, University of Baghdad from November 2018 to June 2019. Fresh stem cuttings, 5 cm long were selected from 6-month old C-35 Citrange rootstock. Five concentrations of BA (0, 1, 1.5, 2 and 2.5 mg.L-1) were studied and addition of meta-Topolin (mT) at four concentrations (0, 1, 5 and 10 mg.L-1) was also studied to find out its effect individually on shoot number and shoot length in multiplication stage. Rooting media supplemented with four concentrations of IBA (0, 1, 2 and 3 mg.L-1) was also studied to find out its effect on rooting percentage, root number and root length. Results showed that BA as concentration of 2.5mg.L-1 significantly gav

... Show More
Scopus (7)
Scopus
Publication Date
Sat Mar 24 2018
Journal Name
Journal Of Optical Communications
Effect of Multiwalled Carbon Nanotube Reinforcement on the Opto-Electronic Properties of Polyaniline/c-Si Heterojunction
...Show More Authors
Abstract<p>In this paper synthesis and extensive investigation of the microstructural and optoelectronic properties of polyaniline (PANI), Multiwalled carbon nanotube (MWCNTs) and MWCNTs reinforced PANI composites is presented. MWCNTs- PANI composites have been deposited by spin coating on silicon wafer substrate. Fourier Transform Infrared Spectroscopy shows no difference between PANI and its composites. However a change in peaks shape and absorption intensity has been observed. A strong effect of the MWCNTs weight percentage on the PANI/MWCNTs composites has been demonstrated. It was find that the thermal stability improved with increasing MWCNTs content. The optical band gap of the PANI thin </p> ... Show More
View Publication
Scopus (53)
Crossref (50)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of the application of IFRS 15 "Revenue from contracts with customers" on the quality of financial reporting
...Show More Authors

Abstract

This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref