Preferred Language
Articles
/
alkej-10
Fuzzy control of mobile robot in slippery environment
...Show More Authors

 

The problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of МR with two driving wheels.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Physical Work Environment upon Nurses’ Job performance in Al-Nassiryah City Hospitals
...Show More Authors

AbstractObjectives: The work environment has an impact on the performance of nurses, as well as to determine the relationship between the work environment and the performance of nurses.Research methodology: A descriptive analytical study was designed for the impact of the work environment on the performance of nurses' jobs in the hospitals of the city of Nasiriyah. The study began in the period from May 15, 2022 to 1 November, 2022. The non-probability (purposive) sample consisted of (410) nurses working in the city center hospitals. Nasiriyah, they were chosen based on the study criteria, and after obtaining approval from them. The data was collected using the questionnaire, which consi

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
protect the environment from destruction in light of the verses of the Quran (Subjective Study)
...Show More Authors

Environment suffered in recent years a large corrupting by human; and because of his ignorance of the dimensions of Caliphate in the ground and ignore what it means gearing. The gearing is that the son of Adam, which will benefit the board of Allah Almighty to him in the land of the causes of life, without exaggeration or negligence and without prejudice to the cosmic Balnoames enacted by the Almighty Creator, has urged verses of the Quran Muslim to preserve and protect the environment which is a religious duty, as it showed a great verses he is the author and the splendor and beauty of workmanship and manufacturer greatness of the Almighty, who created all things beautiful.
Koran played a major role in the consolidation of environmen

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Magnetorheological Normally Close Directional Control Valve: Magnetorheological normally close directional control valve
...Show More Authors

This valve is intended for use in valves for steering movement, using the qualities of the Magneto-rheological (MR) fluid to regulate the fluid, direct contact without the utilization of moving parts like a spool, a connection between electric flux, and fluid power was made, The simulation was done to employ the" finite element method of magnetism (FEMM)" to arrive at the best design. This software is used for magnetic resonance valve finite element analysis. The valve's best performance was obtained by using a closed directional control valve in the normal state normally closed (NC) MR valve, with simulation results revealing the optimum magnetic flux density in the absence of a current and the shedding condition, as well as the optimum

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Properties of the Adjoint Operator of a General Fuzzy Bounded Operator
...Show More Authors

Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.

View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 08 2023
Journal Name
International Journal Of Scientific Trends
The Role of Renewable Energy in the Protection of the Iraqi Environment
...Show More Authors

In this article, the types of renewable energies and the environmental effects of consuming these energies are studied. Energy is one of the things necessary for economic and social development and improving the quality of life, and the presence of continuous and sustainable economic energy is essential for any economic development and growth. Humankind has been aware of renewable energies such as biomass and geothermal energy for a long time and has used these energies as heat sources for shelter. With the beginning of the extraction of fossil fuels such as oil and coal and unlimited access to these products, the use of renewable energy sources, except in remote places and forest areas, has become limited and forgotten. Currently in Iraq,

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
جعفر الصادق
The Role of Criminal Policy in Iraq in Protecting and Improving the Environment
...Show More Authors