The grasping stability of robotic manipulators is crucial to enable autonomous manipulation in an environment where robots are facing obstacles in their route, where abrupt changes in the robot’s speed are induced. These speed variations will produce forces affecting the robotic manipulator, hence its grasping stability. In this research, the grasping stability of a robotic manipulator that functions according to a frictional self-locking mechanism is investigated statically and dynamically. Both theoretical and experimental results showed that the grasped object size, weight, and its orientation inside the gripper have a great effect on grasping stability. Both the theoretical and experimental results indicated that the grasping object parameters (diameter 25.5 mm–72 mm, weight 25 N–40 N) as well as its orientation inside the gripper influence the grasping stability. The configuration achieved which loaded 40 N, grasped an object of diameter 25.5 mm, and used an initial torque of 0.5N-m with rubber tube material showed optimal grasping stability of 98%. The dynamic test revealed that pulse disturbances (5 mm amplitude, 1.0 s duration) were stable without exceeding two degrees of vertical angular deviation.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreAn excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.
The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreAdvertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.
Abstract:
This research seeks to test the influence of intellectual capital as an explanatory variable and its components (human capital, structural capital, relational capital) and sustainable competitive performance as a responsive variable and its components (reducing service delivery cycle time, rapid response to market demand, increasing customer satisfaction, providing better Quality of service, increasing market share)” through a field study, and here the research problem was diagnosed in an attempt to answer the following question: Is there awareness among the senior management within the private colle
... Show MoreThis paper and research paper analyzes the critical methodology of "Ali Khan Joommal “ about the Bible , directed in most of the textual criticism of the Torah, and its highest criticism is directed to both the Old and New Testaments.
Joommal was distinguished by the mental methods and examples accompanying his era, while maintaining the general context in which Muslim scholars had previously followed, and he was distinguished from them by his many citations to the Western literature of Jews or Christians, in short it is a critical phenomenon worthy of study and evaluation.
This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic
... Show MoreIntroduction: An aneurysmal bone cyst are enigmatic lesion of unknown cause and presentation and are difficult to distinguish from other lesions, it is a benign, but expansible tumor like lesion that generally occurs in the long bones. An aneurysmal bone cyst arising from the flat bone like clavicle is rare . Case presentation: We report a 12-year-old girl child with an aneurysmal bone cyst of the lateral third of left clavicle treated with enblock resection. The pathologic findings confirmed the diagnosis of aneurysmal bone cyst. The patient has been followed up for one year with no evidence of recurrence . Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.