Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed in the robotic firefighting process, and designing a fuzzy controller algorithm that can be used in all expected scenarios. The use of a fuzzy logic algorithm in this design demonstrates the usefulness of this system, all factors are involved in which cases are previously identified and taught, as well as the overall map of the premises have been uploaded so that the system can identify the exact place of the fire source, and two types of fire have also been examined. When the performance of the foam pump, water pump, and robotic car motors is compared to the data from the flam sensor, temperature sensor and GPS data, it demonstrates a high responsiveness in terms of applying the appropriate approach based on the type of fire due to the probable action for which the system has been trained. This will have the benefit of shortening the required process for fire extinguishment and using the appropriate fire extinguishing tools. This technology may be used to put out flames, deploy in different areas, and handle a variety of fire scenarios inside buildings
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth. Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment. Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show MoreObjective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreWe notice that the issue of development is one of the most important issues in ourepoch especially in our country which classify within back ward countries.
When we talk here about the development we don’t mean only the development of capitals or the development of products.but the most important thing is the development of mind .if we notice the experience of developits economy and it didn’t reach to the wanted aim.because these sides . The highness of the meutal rate of the nation is the standard of of the nation is the standard of the sentific and cultural advance for this nation .And that is what we have noticed in human societies ingenerall .
We noticed that
... Show More