Preferred Language
Articles
/
FhdAU44BVTCNdQwCI0Iw
Inverse Kinematics Optimization for Humanoid Robotic Legs Based on Particle Swarm Optimization
...Show More Authors

Calculating the Inverse Kinematic (IK) equations is a complex problem due to the nonlinearity of these equations. Choosing the end effector orientation affects the reach of the target location. The Forward Kinematics (FK) of Humanoid Robotic Legs (HRL) is determined by using DenavitHartenberg (DH) method. The HRL has two legs with five Degrees of Freedom (DoF) each. The paper proposes using a Particle Swarm Optimization (PSO) algorithm to optimize the best orientation angle of the end effector of HRL. The selected orientation angle is used to solve the IK equations to reach the target location with minimum error. The performance of the proposed method is measured by six scenarios with different simulated positions of the legs. The proposed method is compared with procedures that used different optimization algorithms such as Genetic Algorithm (GA), Differential Evolution (DE), and Invasive Weed Optimization (IWO). The Root Mean Square Error (RMSE) and computation time are used as comparison measures. The proposed method gives the best results among others, and it reaches the target location with an average RMSE of 10-12 with 2.5 seconds average computation time.

Scopus Crossref
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Particle size effect on XRF measurements of Copper and Zinc particles suspended in hydrocarbon materials
...Show More Authors

Copper and Zinc powders with different particle sizes were subjected to sieving of range (20-100?m) and He-Ne laser system to determine the particle size . 1wt% from each powders was blended carefully with 99wt% from Iraqi oil . Microscopic examination were carried for all samples to reveal the particle size distribution . XRF intensity measurements were conducted for all suspended samples , and the relation between XRF intensity and the particle size was found .

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Petroleum Science And Engineering
Effect of wettability on particle settlement behavior within Mono-Ethylene Glycol regeneration pre-treatment systems
...Show More Authors

This study was undertaken to diagnose routine settling problems within a third-party oil and gas companies’ Mono-Ethylene Glycol (MEG) regeneration system. Two primary issues were identified including; a) low particle size (<40 μm) resulting in poor settlement within high viscosity MEG solution and b) exposure to hydrocarbon condensate causing modification of particle surface properties through oil-wetting of the particle surface. Analysis of oil-wetted quartz and iron carbonate (FeCO₃) settlement behavior found a greater tendency to remain suspended in the solution and be removed in the rich MEG effluent stream or to strongly float and accumulate at the liquid-vapor interface in comparison to naturally water-wetted particles. As su

... Show More
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Sep 18 2020
Journal Name
Hal Open Science
Adaptive Approximation Control of Robotic Manipulators: Centralized and Decentralized Control Algorithms
...Show More Authors

The regressor-based adaptive control is useful for controlling robotic systems with uncertain parameters but with known structure of robot dynamics. Unmodeled dynamics could lead to instability problems unless modification of control law is used. In addition, exact calculation of regressor for robots with more than 6 degrees of freedom is hard to be calculated, and the task could be more complex for robots. Whereas the adaptive approximation control is a powerful tool for controlling robotic systems with unmodeled dynamics. The local (partitioned) approximation-based adaptive control includes representation of the uncertain matrices and vectors in the robot model as finite combinations of basis functions. Update laws for the weighting matri

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Numerical solution to inverse coefficient problem for hyperbolic equation under overspecified condition of general integral type
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Reliability Estimation for the Exponential Distribution Based on Monte Carlo Simulation
...Show More Authors

        This Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drag Forces under Longitudinal Interaction of Two Particle
...Show More Authors

Direct measurements of drag force on two interacting particles  arranged in the longitudinal direction for particle Reynolds numbers varying from J O to 103 are conducted using a micro-force measurement system. The effect of the interparticle distance and Reynolds number on the drag forces  is examined. An empirical equation is obtained to describe the effect of the interparticle distance (l/d) on the dimensionless drag.

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
The transition rates for 232Th using the two component particle-hole state density with different corrections
...Show More Authors

The particle-hole state densities have been calculated for 232Th in
the case of incident neutron with  ,  1 Z Z T T T T and   2 Z T T .
The finite well depth, surface effect, isospin and Pauli correction are
considered in the calculation of the state densities and then the
transition rates. The isospin correction function ( ) iso f has been
examined for different exciton configurations and at different
excitation energies up to 100 MeV. The present results are indicated
that the included corrections have more affected on transition rates
behavior for        , , and    above 30MeV excitation energy

View Publication Preview PDF