Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
Background: The gene responsible for encoding the protein of cytotoxic T lymphocyte-associated antigen-4 (CTLA-4) has been found to be associated with rheumatoid arthritis (RA) in different ethnic populations. But the association of +49A/G CTLA-4 polymorphism with susceptibility of RA among Iraqi Arab populations has not yet been determined. Methods: One hundred and seventy-eight patients were examined, 67 of them were males (mean age 54.71 ± 10.4 years), while 167 were examined for the control group, of whom 64 were males and the rest were females. CTLA-4 DNA genotyping was carried on to determine the +49 A/G (rs231775) polymorphism using a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP). Enzyme-linked immuno
... Show MoreObjectives: the study aims to findout the effectiveness of educational program concerning infection control guideline on nurses, and to find out the relationship between effectiveness of program and types of hospital unit, age, level of education, and years of experience of nurses. Methodology: A quasi-experimental design study was carried out in Baghdad teaching hospital in the wards, for the period of December, 20th 2013 to September, 30th of July 2014, The study samples is composed of (60) nurses who have been actually working in the medical ward, blood disease, psychiatric ward, and neurological war
Research in consumer science has proven that grocery shopping is a complex and distressing process. Further, the task of generating the grocery lists for the grocery shopping is always undervalued as the effort and time took to create and manage the grocery lists are unseen and unrecognized. Even though grocery lists represent consumers’ purchase intention, research pertaining the grocery lists does not get much attention from researchers; therefore, limited studies about the topic are found in the literature. Hence, this study aims at bridging the gap by designing and developing a mobile app (application) for creating and managing grocery lists using modern smartphones. Smartphones are pervasive and become a necessity for everyone tod
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show More