Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreThis work is focused on the design parameters and activity of artificial human finger for seven grips. At first, obtained the ideal kinematics of human fingers motion by analyzing the grips video which were recorded using a single digital camera recorder fitted on a tripod in sagital plane while the hand is moving. Special motion analysis software (Dartfish) the finger joint angles were studied using the video recording. Then the seven grips were modeled using static torque analysis, which calculates the amount of torque applied on the fingers joint grip depending on the results of the kinematic analysis. The last step of the work was to design the actuator (Muscle Wire) of artificial finger for the seven grips in a simple design approac
... Show MoreAn indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show MoreAs an architectural philosophical concept, Islamic architecture cannot be considered arches, doors, domes and lighthouses, since Islamic architecture is based on a structural system of religious, mental, philosophical and logical origins and beliefs shared by the arts, technology and the requirements of the surrounding environment. Rather, the architectural designer's distance from it becomes as if it is for people not from this world, and Islamic architecture is not abbreviated on the heritage side as much as it is a renewed "modern" state, dealing with the concepts of Islam that are valid for every time and place. This can be seen through the mechanisms that produced heritage architecture and what was built on it, which is not a simula
... Show MoreIn this paper it was designed a new fractal optical modulation by using a new iteration of fractal function, the result was analyzed by MTF evaluation, and it compared with results of normal optical modulation.
The normal and fractal optical modulator is a circular disc which has a radius R=9cm, both of them consist of twenty sectors, ten sectors are opaque and the other ten sectors are transmitted for the light.
The fractal optical modulator contains two patterns, the pattern two can be used to detect the target, and pattern one can be used to lock the target
The best similarity of MTF behavior for normal and fractal Reticle was evaluating the power transparent depends on the size o
... Show MoreIn the midst of conflicts different intellectual and knowledge of production processes and circulation we need constant search for different levels of Innovation replenished with renewed need to develop solutions to various problems. Amid this conflict comes to mind a question about what salt creative mechanisms act in Graphic Design? Through this research is marked (creative mechanisms act in Graphic Design) strive to find solutions
to this question, as well as cognitive it Sarphi side modern and developmental study to a broader understanding of the subject. And across four seasons, which included the first chapter of the research problem and the need for him, and then came the second chapter includes theoretical framework goal Bemb
The need for an intellectual understanding of the context from many aspects' dictates understanding the ways through which the graphic designer walks in simulating the intent of the design process and elevating it to levels of communicative perception that leads to communicating the idea to the recipient, and it is thus a need closely related to the context, if it is historical. Culturally or socially, and between the mechanisms of selecting and operating the elements and units of the graphic and design achievement. On this basis, the role of context in graphic design can be studied.
The research included four chapters, the first chapter of the research problem and the need for it, and the aim of the research was (discovering the
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio