Preferred Language
Articles
/
alkej-466
Motion Control of Three Links Robot Manipulator (Open Chain) with Spherical Wrist
...Show More Authors

Robot manipulator is a multi-input multi-output system with high complex nonlinear dynamics, requiring an advanced controller in order to track a specific trajectory. In this work, forward and inverse kinematics are presented based on Denavit Hartenberg notation to convert the end effector planned path from cartesian space to joint space and vice versa where a cubic spline interpolation is used for trajectory segments to ensure the continuity in velocity and acceleration.  Also, the derived mathematical dynamic model is based on Eular Lagrange energy method to contain the effect of friction and disturbance torques beside the inertia and Coriolis effect. Two types of controller are applied ; the nonlinear computed torque control (CTC) and the simpler form of its Proportional Derivative plus Gravity (PD+G)  where they are designed to reduce the tracking trajectory errors which tend to zero where the used Kp and Kv gains are 900,60. Also, the RMS errors for tracking a step input of CTC were equal to  [2.5E-14, 4.4E-14, 5.0E-14, -4.7E-14, -3.9E-14, -4.6E-14] (deg) and of PD+G were equal to [-1.77E-5, -1.22E-6, -4.28E-6, -8.97E-6, -1.32E-5, 1.05E-5] (deg)  for joints one to six, respectively. The results show that CTC is more accurate but requires additional acceleration input and is more computationally extensive and PD+G controller is performed with acceptable tracking errors in manipulator position control applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Ruling on dealing with Jews in Muslim countries
...Show More Authors

Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
MENTAL PICTURE THEORY AND PROBLEMATIC RELATIONSHIP WITH PROFILING
...Show More Authors

Walter Lippmann, speaking about man, says : ” Gradually he makes for himself a trustworthy picture inside his head of the world beyond his reach. “. This means that the picture, whether it was good or bad, it doesn’t happen for nothing, but rather for intentional purposes. Some orientalists make their judgements even before getting to the place concerned with the study.

The mental image is one of the most misused terminology, although the world today has become the world of image, it witnessed the disappearance of the theories that used to consider the media as a reflective mirror for society, also it was confirmed that the media creates what varies from reality and sometimes completely different from reality. The image of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Spectroscopy and Biological Activity Study of Some New Complexes with Schiff Base Derived From Malonic Acid Dihydrazide with 2-pyridine Crboxaldehyde
...Show More Authors

تم تحضير ثلاث معقدات جديدة Ni (II)و Cu (II) و Zn (II) باستخدام الليكند المحضر الجديد من تفاعل حامض مالونيك ثنائي هيدرازايد مع 2-بيريدين كربوكسالديهايد. حيث شخصت المعقدات لمحضرة وكذلك الليكند باستخدام تقنيات مختلفة مثل FT-IR و UV-Vis و Mass و 1H-NMR و 13C-NMR وتحليل العناصر CHN و تقدير محتوى  الكلور والموصلية المولارية والحساسية المغناطيسية والامتصاص الذري لتشخيص هذه المركبات. لكل معقد محضر جديد من النيكل والنحاس والزنك ، كشفت نتائج ا

... Show More
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Revision of some Biomarkers with Cytokines in Breast Cancer
...Show More Authors

Breast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Physical Education
The effect of rehabilitation exercises with body weight and rubber resistance on the range of motion and the strength of the sprained ankle muscles in female rugby players
...Show More Authors

The study aimed to prepare a set of qualifying exercises to improve the muscular strength of the muscles surrounding the ankle joint by applying different resistances according to the nature of the movement of this joint, which is one of the second moving joints (flexion, extension and rotation of the right and left) in order to increase the efficiency of all muscles working on this joint according to those movements and identification On the impact of these exercises and assume that there will be statistical differences between the two tests of the research sample. The researcher used the semi-articulated experimental method with a pre- and post-test for one group. The injury was evaluated on the women's national team players durin

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More