Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of mobile robot was driven for the case where the centroid of mobile robot platform is not coincide with reference frame of mobile robot (i.e. reference frame is located at midpoint of driven wheels axis), while the inertia is counted for. The Evolutionary Algorithm has been used to modified the parameters (Kp, Kd, Ki,a, and b) of the FOPID controller for wheeled mobile robot. Simulation results show the effectiveness of the proposed control algorithm: that is demonstrated by applied this controller at four case studies (Circular trajectory, S-shape trajectory, Infinity trajectory, and Line trajectory at two cases, with presences of disturbance and without), these results shows good matching between desired trajectory and simulation one while error in posture goes to zero rapidly.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreObjective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreAbstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin
... Show MoreObjectives: The purpose of the study is to ascertain the relationship between the training program and the socio-demographic features of patients with peptic ulcers in order to assess the efficiency of the program on patients' nutritional habits.
Methodology: Between January 17 and October 30 of 2022, The Center of Gastrointestinal Medicine and Surgery at Al-Diwanyiah Teaching Hospital conducted "a quasi-experimental study". A non-probability sample of 30 patients for the case group and 30 patients for the control group was selected based on the study's criteria. The study instrument was divided into 4 sections: the first portion contained 7 questions about demographic information, the second sect
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show More