This paper presents a control system to make the robotic hand mimic human hand motion in real time and offline mode. The human hand tracking system is a wearable sensing arm (potentiometers) used to determine the position in space and to sense the grasping task of human hand. The maskable sensing arm was designed with same geometrical arrangement of robotic hand that needs to be controlled. The control software of a robot was implemented using Visual Basic and supported with graphical user interface (GUI). The control algorithm depends on joint to joint mapping method to match between the motions at each joint of portable sensing arm with corresponding joint of a robot in order to make the robot mimic the motion.
يرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.
ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:
- المحاسبة نظام معلومات.
- الادارة صانعة للقرار.<
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAbstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The hydatid materials were collected and studied, so they were contained 50 fertile human hydatid cases {33 (66%) females and 17 (34%) males}. They were collected from Al-Ramadi General Hospital during the period from December, 2003 to July, 2004 .Cysts were observed in 40 (80%) from the liver, 5 (10%) from the lungs, 3 (6%) from the kidney and 2 (4%) cysts from urinary bladder. The specimens were taken from patients of different ages. The in vitro viability of protoscoleces was assessed on the basis of flame cell activity and eosein exclusion, which were considered as criteria to determine the death or viability of protoscoleces. In addition to this movement (flame cell activity), another motility like constriction – relaxatio
... Show MoreThis paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show MoreThe hydraulic conditions of a flow previously proved to be changed when placing large-scale geometric roughness elements on the bed of an open channel. These elements impose more resistance to the flow. The geometry of the roughness elements, the numbers used, and the configuration are parameters that can affect the hydraulic flow characteristics. The target is to use inclined block elements to control the salt wedge propagation pointed in most estuaries to prevent its negative effects. The Computational Fluid Dynamics CFD Software was used to simulate the two-phase flow in an estuary model. In this model, the used block elements are 2 cm by 3 cm cross-sections with an inclined face in the flow direction, with a length
... Show MoreAbstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data
... Show MoreIraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show MoreThis research aims to study and reveal the influence of Bauhaus principles in contemporary graphic design. The researcher determined the objective/spatial/temporal limit: Study of the Bauhaus influence in the design of the graphic poster in Germany in 2020. The theoretical framework in the first section dealt with (the emergence and factors of the emergence of the Bauhaus school and its characteristics), while the second topic dealt with (the intellectual, functional and aesthetic data of the Bauhaus School), after which the indicators that resulted from the theoretical framework were produced.
He mentioned four previous studies, one of them was discussed in detail. In the third chapter he defined the methodology, society, and sam
... Show More