A demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated by MATLAB program. Joint angles and end effecter positions of robot results values of circular trajectory are better than joint angles end effecter positions of robot results values of NN work in another paper. Three link redundant robot workspace is also simulated. The outputs results of best three joint angles are evaluated for two trajectories sinwave and circular, with 50 generations the algorithm is fast. This paper presents the simulations results that are obtained based on MATLAB R2010b program.
ABSTRACT
The controversy is currently revolving around industrial additives, including antioxidants, their negative effects on consumer health and the emergence of various and various diseases, which led scientists and researchers to intensify most studies on natural antioxidants and their synthesis from medicinal plants mentioned in ancient medicine and in divine books as potential antioxidants of increasing importance. Therefore, this study was designed to synthesize silver nitrate particles from plant leaf extracts (Figs, Olives, and Moringa) and study their effect on bacterial inhibition of each of the undesirable Coliform bacteria (E-Coli,
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
Cladophora and Spirulina algae biomass have been used for the removal of Tetracycline (TC) antibiotic from aqueous solution. Different operation conditions were varied in batch process, such as initial antibiotic concentration, different biomass dosage and type, contact time, agitation speed, and initial pH. The result showed that the maximum removal efficiencies by using 1.25 g/100 ml Cladophora and 0.5 g/100 ml Spirulina algae biomass were 95% and 94% respectively. At the optimum experimental condition of temperature 25°C, initial TC concentration 50 mg/l, contact time 2.5hr, agitation speed 200 rpm and pH 6.5. The characterization of Cladophora and Spirulina biomass by Fourier transform infrared (FTIR) indicates that the presenc
... Show MoreThe Na-alginate bead is commonly used in biotechnology fields such as adsorption due to ion exchange between Ca and Na with elements. Scanning electron microscopy (SEM-EDX) has proven to be a comparative method in the detections of these adsorbed elements, but the un-flat forming area of beads that can introduce impossible of the detection of element adsorbed. In contrast, X-ray fluorescence (XRF) documents analysis of elements, direct examination, which may analysis the adsorbents of elements. Here, this Study evaluated the possibility by using XRF for the direct analysis for examples of Cd and Ag in a bench stand. This Study compared this to commonly use
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .