Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptive approximation-based feedback linearization control (so-called adaptive computed torque control) combined with an anti-windup compensator is designed to track the desired COM produced by the high-level command. Along the length of the support sole, the ZMP with physical restrictions serves as the control input signal. The viability of the suggested controller is established using Lyapunov’s theory. The low-level control tracks the intended joint movements for a bipedal mechanism with flexible joints. We use two control strategies: position-based adaptive approximation control and cascaded position-torque adaptive approximation control (cascaded PTAAC). The interesting point is that the cascaded PTAAC can be extended to deal with variable impedance robotic joints by using the required velocity concept, including the desired velocity and terms related to control errors such as position, force, torque, or impedance errors if needed. A 6-link bipedal robot is used in simulation and validation experiments to demonstrate the viability of the suggested control structure.
Objectives: To determine the effectiveness of the educational program on nursing staff knowledge about infection control measures at the Intensive Care Unit in Al-Diwaniya Teaching Hospital.
Methodology: A pre-experimental design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 20th February to 5th March, 2020) on a non-probability (purposive) sample consisting of (25 nurses) working in ICU. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (age, gender, level of education, years of experien
... Show MoreSupport vector machine (SVM) is a popular supervised learning algorithm based on margin maximization. It has a high training cost and does not scale well to a large number of data points. We propose a multiresolution algorithm MRH-SVM that trains SVM on a hierarchical data aggregation structure, which also serves as a common data input to other learning algorithms. The proposed algorithm learns SVM models using high-level data aggregates and only visits data aggregates at more detailed levels where support vectors reside. In addition to performance improvements, the algorithm has advantages such as the ability to handle data streams and datasets with imbalanced classes. Experimental results show significant performance improvements in compa
... Show MoreThis study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreMS Elias, RGM AL-helfy, Plant Archives, 2019
Micro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile
... Show More