A systematic approach is presented to achieve the stable grasping of objects through a two-finger robotic hand, in which each finger cavity was filled with granular media. The compaction of the latter, controlled by vacuum pressure, was used to adjust the structural and contact stiffness of the finger. The grasping stability was studied under the concurrent effect of an external torque and applied vacuum pressure. Stable grasping was defined as the no slippage condition between the grasped object and the two fingers. Three control schemes were adopted and applied experimentally to ensure the effectiveness of the grasping process. The results showed that stable and unstable grasping regions exist for each combination of applied torque and vacuum pressure. The two-finger robotic hands can be further improved for applications that require high load-carrying capabilities.
The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreResearch Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.
Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.
Findings: The interest and need of Muslim minorities in non-
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show More