The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end effector position for the desired trajectory.
The aim of this research was to study the concentrations of Uranium in the phosphorus fertilizers using Nuclear track detector (CR-39). Our present investigation is based on the study of 10 types samples for different kinds of phosphorus fertilizers which were available in the local market Some of them were Iraqi made and the others from different countries like, (Iran, Italy, Holland, Lebanon and Jordan) .. The result obtained shows that the Uranium concentration in phosphorus fertilizers samples varies from (3.59ppm) to(2.59ppm). Based on the radioactive concentration of Uranium in the samples all the results obtained between(3.59ppm) in the Iraqi super phosphate to (2.59ppm) in the mixture Iraqi phosphate fertilizer are withi
... Show MoreThis presented study is to make comparison of cross sections to produce 71As, 72As, 73As and 74As via different reactions with particle incident energy up to 60 MeV of alpha 100 MeV of proton as a part of systematic studies on particle-induced activations on enriched Ge, Ga, Rb and Nb targets and neutron capture. Theoretical calculation of production yield, and suggestion of optimum reaction to produce 71As, 72As, 73As and 74As, based on the main published and approved experimental results of excitation functions were calculated.
Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreThis paper presents the Taguchi approach for optimization of hardness for shape memory alloy (Cu-Al-Ni) . The influence of powder metallurgy parameters on hardness has been investigated. Taguchi technique and ANOVA were used for analysis. Nine experimental runs based on Taguchi’s L9 orthogonal array were performed (OA),for two parameters was study (Pressure and sintering temperature) for three different levels (300 ,500 and 700) MPa ,(700 ,800 and 900)oC respectively . Main effect, signal-to-noise (S/N) ratio was study, and analysis of variance (ANOVA) using to investigate the micro-hardness characteristics of the shape memory alloy .after application the result of study shown the hei
... Show MoreThe importance of the study stems from the fact that Iraq’s economy is facing a housing crisis, especially in the Iraqi capital, Baghdad, great demographic pressure due to pronounced population growth over the past two decades. The Central Bank of Iraq undertakes several initiatives represented in granting real estate loans, mainly through the Real Estate Bank at very low interest, and in the last two years, the interest has become zero. The purpose of the study is to analyze the fiscal implications of the Iraqi central bank’s real estate initiatives, as well as its real impact on the spatial dimension of the Iraqi governorates through new housing in those governorates. Using data mainly from the Central Bank of Iraq’s bulleti
... Show MoreThe behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More