Preferred Language
Articles
/
mxYwjIcBVTCNdQwCn1Vx
Real-Time SLAM Mobile Robot and Navigation Based on Cloud-Based Implementation
...Show More Authors

This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database to display maps and use them at any time for navigation without the need to redraw the map. This map can be accessed by using an authentication process (username and password) supervised by the cloud server administrator. After that, using the serverless image handler (SIH), with the aid of this solution, you can change the size of images, change the color of the background, format them, or add watermarks. Experiment results demonstrated the ability to build a map of an unknown location in a complex environment and use it for navigation tasks on a real mobile robot via remote control. It also showed the success of the process of storing the map for future use and the process of modifying the map using SIH.

Scopus Crossref
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Chemical Engineering Research And Design
Ternary glycerol-based deep eutectic solvents: Physicochemical properties and enzymatic activity
...Show More Authors

The present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antibacterial Activity Evaluation of New Indole-Based Derivatives
...Show More Authors

A new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
New Spectrophotometric Estimation and Cloud Point Extraction of Cefdinir
...Show More Authors

A sensitive spectrophotometric method was developed for the estimation of cefdinir (CFD), a cephalosporin species. This study involves two methods, and the first method includes the preparing of azo dye by the reaction of CFD diazonium salt with 4-Tert-Butylphenol (4-TBP) and 2-Naphthol (2-NPT) in alkaline medium, which shows colored dyes measured at λmax 490 and 535 nm, respectively. Beer's law was obeyed along the concentration range of (3-100) μg.ml-1. The limits of detection were 0.246, 0.447 μg.ml-1 and molar absorptivities were 0.6129×104, 0.3361×104 L.mol-1cm-1 for (CFD-4-TBP) and (CFD-2-NPT), respectively. The second method includes preconcentration for cefdinir dyes by using cloud point extraction in the presence of Triton

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
The European Physical Journal Applied Physics
A carbon nanotubes photoconductive detector for middle and far infrared regions based on porous silicon and a polyamide nylon polymer
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref