This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; this is demonstrated by the minimized tracking error and obtained smoothness of the velocity control signal, especially when external disturbances are applied.
Abstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show MoreThe Migration is one of the important dynamic population movement phenomena in population studies because of its great impact in changing many demographic characteristics between the region of origin and arrival. And the multiplicity of forms and types according to the different reasons for it and the motives that prompted the population to move, as well as the currents and their size are also different according to the different causes, and here there are many types of migration, and many of them have been studied at the local and regional levels, and as long as the population is in a continuous dynamic movement, other types of migration are generated. (Al Douri, 2015, 230) &nbs
... Show Moreunacceptable social behaviors, particularly withdrawal behavior that appears in children with autism represent a major problem hindering the process of communication with those around them and therefore the process of mergence with them be difficult.
The withdrawal causes a real affect deficit for children with autism limits the possibility of development of their intellectual and mental growth due to their solitude and the weakness of their focus in the acquisition of pedagogical skills and lack the necessary social skills to maintain the relations of friendship and enjoyment of them.
withdrawal children fail to participate
... Show MoreResearchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als
... Show MoreThis research set to indicate the role of the opportunity cost in the overall economic development (human and social development) by selecting the most appropriate alternative for the growth of the country in exchange for sacrificing profit limits to achieve this growth and development of the country, especially in the present circumstances of the country and after studying the reality of the economic case for him, as the problem lies with don't selecting the best alternative that enhances the gross domestic product, which extends to promote overall economic development and revive the industrial and agricultural sectors, productivity is more like Impotent, versus sacrifice alternative consumption may bring more financially lucrative than
... Show MoreAs performers in a social world, we communicate with other people by sharing information on many different levels. Each utterance includes linguistic information and conveys much information about the speaker’s identity. Variation in voice quality indexes information about the speaker and marks the speaker’s identity as a unique individual. The present study aims to validate the belief that each individual has an inalienable voice print that can’t be imitated. The study verifies that, even the more similar personality between two individuals, or the close position in society the variance is voice quality. The acoustic analysis is performed via analysing the acoustic parameters namely: the fundamental frequency, amplitude, inten
... Show MoreThe research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More