Kinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this method can be adopted for engineering applications. MATLAB (Graphical User Interface) program was used to simulate the movement of the robotic arm in 3D. Also, MATLAB (GUI) has been used to view the position of each joint.The results showed thatthe maximum error in the x, y, and z coordinates of the end-effector were 0.0251 %, 0.0239 %, and 0.1085 % respectively.
Abstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreNumerical simulations have been investigated to study the external free convective heat transfer from a vertically rectangular interrupted fin arrays. The continuity, Naver-Stockes and energy equations have been solved for steady-state, incompressible, two dimensional, laminar with Boussiuesq approximation by Fluent 15 software. The performance of interrupted fins was evaluated to gain the optimum ratio of interrupted length to fin length (
Physically based modeling approach has been widely developed in recent years for the simulation of dam failure process due to the lack of field data. This paper provides and describes a physically-based model depending on dimensional analysis and hydraulic simulation methods for estimating the maximum water level and the wave propagation time from breaching of field test dams. The field physical model has been constructed in Dabbah city to represent the collapse of the Roseires dam in Sudan. Five cases of a dam failure were studied to simulate water flood conditions by changing initial water height in the reservoir (0.8, 1.0, 1.2, 1.4 and 1.5 m respectively).The physical model working under five cases, case 5 had the greatest influence of t
... Show MoreIn this study, a simulation model inside a channel of rectangular section with high of (0.16 m) containing two rectangular obstruction plates were aligned variable heights normal to the direction of flow, use six model of the obstructions height of (0.059, 0.066, 0.073, 0.08 and 0.087 m) were compared with the flow behavior of the same duct without obstructions. To predict the velocity profile, pressure distribution, pressure coefficient and turbulence kinetic energy flow of air, the differential equations which describe the flow were approximated by the finite volumes method for two dimensional, by using commercial software package (FLUENT) with standard of k-ε model two dimensions turbulence flow.
... Show MoreCoaxial (wire-cylinder) electrodes arrangements are widely used for electrostatic deposition of dust particles in flue gases, when a high voltage is applied to electrodes immersed in air and provide a strongly non-uniform electric field. The efficiency of electrostatic filters mainly depends on the value of the applied voltage and the distribution of the electric field. In this work, a two-dimensional computer simulation was constructed to study the effect of different applied voltages (20, 22, 25, 26, 28, 30 kV) on the inner electrode and their effect on the efficiency of the electrostatic precipitator. Finite Element Method (FEM) and COMSOL Multiphysics software were used to simulate the cross section of a wire cylinder. The results sh
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreBioindicators have an important role in assessing the quality of water bodies. Aquatic oligocheates, was used as a bioindicator to assess the sediment quality of Al-Hindyia and AL-Abbasyia river (branches of Euphrates River in Iraq). Two sites in each river have been chosen for this purpose, site S1 was located at Al-Hindyia River and S2 at Al-Abbasyia River. Some kinds of biological indices were used in this study, comprising the percentage of oligochaetes in benthic invertebrates, ranged from 20.3-60.16%. While the percentage of Tubificidae within benthic invertebrates was close 43.3-43.9%.Index of pollution D ranged from 0.13-0.21. The maximum percentage of aquatic oligochaetes to insects larvae of family
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreComplexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4-thiadiazole-2-yl)phenyl) thiourea have been prepared and characteizedby elemental analysis, Ff-[R, and u.v./ visible spectra moreover,determination of metal content M%o by flame atomic absorptionspectroscopy, molar conductance in DMSO solution and magneticmoments (peffl.The result showed that the ligand (L) was coordinated to Mn+2, Ni+2,Ct+2,2n+2,Cd+2, and Hg+2 ions through the nitrogen atoms and sulpheratoms.From the result obtained, rhe following general formula [MLCl2] hasbeen given for the prepared complexes with an octahedral geometryaround the metal ions for all complexes.where M= Mn+2, Ni+2, cu+2, zn+2, cd+2, and Hg+2 l= l-phenyl-3-(2-(5-(phenyl amino
... Show More