Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control system, a new controller system was redesigned in this work by using Zigbee. It is a communication protocol for safety and economic data communication in an industrial field, where the wired communication is either expensive or difficult under physical and experimental conditions, such as the worker cannot recognize the error through the manufacturing process. Hence, this paper introduced a system that used microcontroller (AT89S52) with wireless devices (Zigbee) and sensors to control the robotic hand (EDARM ED-7100) and to monitor the information regarding the robot's parameter using WiFi technology. A mathematical model was derived through an empirical method to specify the robot's configuration changes. In this work, the ability of controlling system had increased, as well as hardware, while the necessities of other similar equipment for data communication were minimized. In addition, it presents the comparison of two controlling systems: using the Zigbee and without using it. Based from the experiment it can be safely concluded that the robotic arm's movement had followed a linear function.
Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
A new method based on the Touchard polynomials (TPs) was presented for the numerical solution of the linear Fredholm integro-differential equation (FIDE) of the first order and second kind with condition. The derivative and integration of the (TPs) were simply obtained. The convergence analysis of the presented method was given and the applicability was proved by some numerical examples. The results obtained in this method are compared with other known results.
In modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show MoreBiodiesel as an attractive energy source; a low-cost and green synthesis technique was utilized for biodiesel preparation via waste cooking oil methanolysis using waste snail shell derived catalyst. The present work aimed to investigate the production of biodiesel fuel from waste materials. The catalyst was greenly synthesized from waste snail shells throughout a calcination process at different calcination time of 2–4 h and temperature of 750–950 ◦C. The catalyst samples were characterized using X-Ray Diffraction (XRD), Brunauer-Emmett-Teller (BET), Energy Dispersive X-ray (EDX), and Fourier Transform Infrared (FT-IR). The reaction variables varying in the range of 10:1–30:1 M ratio of MeOH: oil, 3–11 wt% catalyst loading, 50–
... Show MoreThe sport of polo, the game of kings and sultans, is one of the traditional sports that has defied time throughout its long history. It has preserved its historical roots and been able to adapt to contemporary requirements, societal transformations, and temporal and spatial variables. It has moved from an aristocratic sport practiced as a form of entertainment to a professional competitive sport. It attracts many players and millions of viewers, so it is a living model of how sports develop and transform from a local tradition into global sports with organized rules managed by international institutions and with many championships worldwide. Through this, the research objectives were formulated, including exploring sports' origins. Polo in
... Show MoreIs the efficiency of physical and your endurance is of great importance for some activities and field, as it whenever the situation has improved student career was able to perform physical exertion more with energy saving efforts, so the identification of physical aptitude and endurance private students, was based on that there are positively correlated the carrying of training and pregnancy fact on the shoulders of the student. In other words, physical aptitude and endurance in your control level that can be shown by the student during the performance of training and competitions. Therefore, lies the importance of research to test physical aptitude and endurance your help to reveal the career of the body in the light of their relationship
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More