Preferred Language
Articles
/
alkej-775
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm
...Show More Authors

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the performance of the proposed algorithm. Simulations results showed that the proposed path planning algorithm effective performance by finding the shortest and free-collision path in different collide environments. Furthermore, the superiority of the proposed algorithm was proved through comparisons with other famous path planning algorithms with different static environments.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
Iraqi Journal Of Architecture And Planning
Geospatial Techniques for Preparing the Requirements of 3D Modeling for Smart City Planning- Review paper
...Show More Authors

Developing smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 06 2011
Journal Name
Journal Of Planner And Development
The Development of the planning and architectural thought of the holy city of Kadhimia in line with the spirit of the time
...Show More Authors

The evolution of thought, planning for Urban Communities in the second half of the twentieth century, through several successive stages. He was thought of planning urban communities depends on identifying the general plan for land uses of the project area as a basis for drawing charts the physical, social, economic, and put the general plan for land uses based on the terms of reference set by the number of experts in the ministries and agencies. I have lived cities in the Arab-Muslim region, during the transition period the natural and historic environment, urban, sophisticated balanced ways mentioned in the cultural, social, inspired by the teachings of Islam and the customs and traditions of the Arab social, put forth a set of

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Project Planning & Scheduling: بحث تطبيقي لمشاريع / مديرية الابنية المدرسية /دائرة المشاريع /مشروعالوزارةرقم (1)
...Show More Authors

Construction project life-cycle processes must be managed in a more effective and predictable way to meet project stakeholder needs , However, there is increasing concern about whether know-how effectively improves  understanding of underlying theories of project management processes for construction organizations and their project managers  Project planning and scheduling are considered as key and challenging tools in controlling and monitoring project performance , but many worldwide construction projects appear to give insufficient attention to effective management and definition of  project  planning, including pre planning stages . Indeed, some planning issues indeed, some planning issues have been completely ove

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Biological Macromolecules
A novel designed nanofibrous mat based on hydroxypropyl methyl cellulose incorporating mango peel extract for potential use in wound care system
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Experimental Study on Heat Transfer and Friction Factor Characteristics of Single Layer Graphene Based DI-water Nanofluid in a Circular Tube under Laminar Flow and Different Heat Fluxes as Boundary Conditions
...Show More Authors

An experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the  enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate  increased, and the maximum Nusselt number  ratio (Nu nanofluid/ Nu base fluid)   and thermal performance factor

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Using Fuzzy Games Theory to Determine the optimal Strategy for The Mobile Phone Networks in The Baghdad And Basra governorates
...Show More Authors

      The objective of this research is employ the special cases of  function  trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of  Baghdad and Basra, has been the adoption of different periods of the  functions belonging to see the change happening in the matrix matches and the impact  that the strategies  and decision-making  available to each player and the impact on  societ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF