Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the Single Point Incremental Forming (SPIF). The inverse kinematics problem of the conversion method for the position and orientation of a robot manipulator has been addressed to transfer from Cartesian space to joint space. Algebraic and inverse kinematic solutions have been adopted to analyze the rotation, compound rotations and inverse rotations. Graphical User Interface (GUI) in MATLAB environment has been reported with the kinematic structure of a serial-link manipulator by using the Denavit-Hartenberg parameters and a homogeneous transform matrix in toolbox software based on mathematical modeling equations for the moving parts of the selected 3D robotic hand. Investigated the synchronization of real time of the moving axes data with the same monitored animated robot and the results was accurate representation and interpretation of the actual moving of the prototype (robot hand). Real robot hand and animated robot which it designed in Robotics Toolbox in MATLAB are similar in design and orientations of axes, but it differs in the time spent for every movement. It is found that this monitoring and controlling can be achieved with using XBee Pro S1 capability as a wireless nodes with its built in microcontroller and suitable feedback sensors with minimum power consumption and less cost.
In the present study, a novel ligand (L) made of 2-hydroxynaphthaldehyde and 3-hydrazone-1,3-dihydro-indole-2-one(3-[(3-hydroxynaphthalen-2-yl-ethylidene)-hydrazono]-1,3-dihydro-indol-2-one). The ligand was characterized by FTIR, UV-vis, mass, 1H-NMR, 13C-NMR, and CHN elemental analysis. New complexes of this ligand were created by treating methanol and a drop of DMF solution of the produced ligand with the hydrated metal salts of Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) in a molar ratio of 2:1 (L:M). As a result, complexes have been emerged and identified FTIR, UV-vis, C.H.N., chloride-containing, molar conductance, magnetic susceptibility, and atomic absorption. The characterization result for each complex indicated complexes wi
... Show MoreA Raman spectroscopy method was optimised to examine the chemical changes of aspirin tablets after interaction with helium temperatures. Several aspirin tablets were exposed to plasma-assisted desorption ionisation flame for different times (10, 30, 50, 60, 180 and 300s) and then analysed by Raman spectroscopy using optimal conditions. The changes in chemistry between exposed and fresh (without exposure to plasma) tablets were compared. The vibrational peaks of the aspirin molecule in the Raman spectrum were identified by checking the peak position. The results showed clear spectra with increases in intensity of vibrational peaks until 30s, whereas no spectra were measured for the exposed tablets to plasma flame after 50s. It can, the
... Show MoreBackground: Inflammatory bowel disease (IBD) is a collection of chronic, recurrent inflammatory illnesses of the gastrointestinal system, including Crohn's disease (CD). Infliximab is one of the biological medications used to treat CD. Therapeutic drug monitoring has evolved as a treatment in IBD, aiming to optimize benefit while meeting more demanding, objective end criteria. Objective: To determine the achievement of target trough level (TL), develop anti-drug antibodies (ADAs) to infliximab, assess response to therapy, and study TL relations with different variables. Methods: The present study was cross-sectional and conducted from May 2022 to November 2022. It included 40 CD patients allotted into 2 groups: group 1 patients ach
... Show MoreClimate change in recent years has greatly affected the distribution of ground covers. Monitoring these changes has become very easy due to the development of remote sensitivity science and the use of satellites to monitor these changes. The aim of this research is to monitor changes in the spectral reflectivity of the Baghdad governorate center for the month (March, June, September, December) of the year 2021 using remote sensing and satellite images Sentinel 2 and knowing the climate imact on them. Fifty-one samples were selected for four types of ground cover (agricultural land, water, buildings and open space) and their spectral reflectivity was calculated using satellite images.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreEmbracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle
... Show MoreIn this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30∘C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel 88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and
... Show More