Preferred Language
Articles
/
-xdtWZIBVTCNdQwCZawf
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slung load.

Crossref
View Publication
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 20 2022
Journal Name
Eai Endorsed Transactions On Internet Of Things
APP innovation to Control Projects Risks Management during Crises
...Show More Authors

The goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The application of extent of quality management standards control Labor and its impact in reducing cases administrative corruption
...Show More Authors

Concentrated research topic in the study of key variables in the work of the inspectors general offices , which are in the application of quality management standards audit work and reduce the incidence of corruption. It highlights the importance of current research in being a serious attempt aimed at highlighting the role of the importance of standards of quality management audit work , because they represent a router and leader of the accountant or ( Sergeant ) in the performance of his work and the extent of compliance with these standards , as well as highlight the role of quality audit in reducing the incidence of corruption , of during the professional performance of Higher auditors and determine the responsibilities entrus

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Biomed Research International
Potential Association of Maker Expression of Low‐Density Neutrophils and Their Phenotypes in Patients with Periodontitis: Control Study
...Show More Authors

Background. Neutrophils play an important role in maintaining periodontal status in conditions of healthy homeostasis. They achieve their surveillance function by continuously migrating to the gingival sulcus and eradicating periodontal pathogens. In addition, neutrophils are considered an integral element in the pathogenesis of periodontal diseases. Among several neutrophil subsets, low‐density neutrophils (LDN) have recently received attention and are linked with cancer, immunological, inflammatory, and infectious diseases. However, the presence, phenotypes, and potential role of LDN in the pathogenesis of periodontitis have not yet been investigated. Objectives. To investiga

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Plant Protection
Efficacy of silver nanoparticles from Fusarium solani and mycorrhizal inoculation for biological control of Fusarium wilt in tomato
...Show More Authors

The present study investigates the characterization of silver nanoparticles (AgNPs) synthesized using Fusarium solani and their impact on tomato seed germination, plant growth, and disease resistance. A visible color change from yellow to dark smoky indicated the formation of AgNPs, while UV-visible spectrophotometry revealed an absorbance peak at 437 nm, confirming their presence. Atomic force microscopy analysis showed that the AgNPs ranged from 0 to 39.27 nm in size, with an average height of 5.772 nm, while scanning electron microscopy highlighted their diverse surface morphology. The application of AgNPs and mycorrhizal fungi significantly improved tomato seed germination rates, plant height, and dry weight compared to untreate

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of multiple sources of funding on the disclosure of cash flow and the activation of control procedures
...Show More Authors

The principle of an interview requires revenues to expenditures by linking the efforts and achievements and disclosure sufficient to result activity, in the case generate future benefits of a particular asset, this asset appears in the balance sheet to reflect with the rest of the accounting unit's assets on the strength of financial position In the absence of future benefits from the effort are so loaded effort on the result accounts that reflect the outcome of activity during a specific period if the month or be separated or fiscal year. 

The researcher reached the following conclusions:

 1- difficult to control the cash inflows and outflows as a result of the multiplicity of sources of funding.

2- wea

... Show More
View Publication
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF