Preferred Language
Articles
/
QBYySIcBVTCNdQwCWUFv
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped robots has so far been available. The literature is scattered and it is difficult to construct a unified background for the balance strategies of biped motion. The zero-moment point (ZMP) criterion, however, is a conservative indicator of stabilized motion for a class of biped robots. Therefore, we offer a systematic presentation of multi-level balance controllers for stabilization and balance recovery of ZMP-based humanoid robots.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Dithiocarbamates derivatives as anticancer agents: A Review
...Show More Authors

View Publication
Crossref (7)
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
FINGERPRINTS MATCHING USING THE ENERGY AND LOW ORDER MOMENT OF HAAR WAVELET SUBBANDS
...Show More Authors

Fingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Effect of Embedment on Generated Bending Moment in Raft Foundation under Seismic Load
...Show More Authors

This research shows the experimental results of the bending moment in a flexible and rigid raft foundation rested on dense sandy soil with different embedded depth throughout 24 tests. A physical model of dimensions (200mm*200mm) and (320) mm in height was constructed with raft foundation of (10) mm thickness for flexible raft and (23) mm for rigid raft made of reinforced concrete. To imitate the seismic excitation shaking table skill was applied, the shaker was adjusted to three frequencies equal to (1Hz,2Hz, and 3Hz) and displacement magnitude of (13) mm, the foundation was located at four different embedment depths (0,0.25B = 50mm,0.5B = 100mm, and B = 200mm), where B is the raft width. Generally, the maximum bending

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A New Approach of Morgan-Voyce Polynomial to Solve Three Point Boundary Value Problems
...Show More Authors

In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Zenali Iteration Method For Approximating Fixed Point of A δZA - Quasi Contractive mappings
...Show More Authors

This article will introduce a new iteration method called the zenali iteration method for the approximation of fixed points. We show that our iteration process is faster than the current leading iterations  like Mann, Ishikawa, oor, D- iterations, and *-  iteration for new contraction mappings called  quasi contraction mappings. And we  proved that all these iterations (Mann, Ishikawa, oor, D- iterations and *-  iteration) equivalent to approximate fixed points of  quasi contraction. We support our analytic proof by a numerical example, data dependence result for contraction mappings type  by employing zenali iteration also discussed.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 25 2024
Journal Name
Journal Européen Des Systèmes Automatisés
Whole-Body Anti-Input Saturation Control of a Bipedal Robot
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Oct 16 2018
Journal Name
Springer Science And Business Media Llc
MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems
...Show More Authors

Scopus (61)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And Research
SUBJECT: REVIEW METHODS OF DETECTING SUGAR IN A SAMPLE
...Show More Authors