This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algorithm and other two state-of-the-art algorithms. This study showed that the proposed method is effective and produces trajectories with satisfactory results.
Abstract
Nowadays, the adoption of economic unity on the accuracy of financial reporting is very important. Economic units need accurate financial reporting to be more competitive and to improve the performance. Management can also achieve financial information in real time through the application of ERP systems. This system will facilitate management to access the most up-to-date information such as planning, monitoring and evaluating the business processes of the organization to be more effective.
On the practical side, the Enterprise Resource Planning (ERP) system was applied to the General Company for Vegetable Oils to demonstrate a course in enhancing the accuracy of financial reporting.
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreRadiotherapy is the branch of clinical medicine concerned with the application of ionizing radiation in the treatment of disease. And it is used to killing of cancer cells in a tissue using ionizing radiation while keeping the sparing of healthy cells at acceptable level. X-ray beams are used to deposit absorbed dose at depth within a patient at the site of the tumor. The aim of this work is studying the relationship between the depth dose and the field size in water phantom and homogenous actual planning. In our work, the dose distribution at different depths (zero-18 cm) deep at1cm interval treated with field size (10×10 and 20×20) cm2 were studied.
Results show that high similarity between water phantom and actual planning for th
Radiotherapy is the branch of clinical medicine concerned with the application of ionizing radiation in the treatment of disease. And it is used to killing of cancer cells in a tissue using ionizing radiation while keeping the sparing of healthy cells at acceptable level. X-ray beams are used to deposit absorbed dose at depth within a patient at the site of the tumor. The aim of this work is studying the relationship between the depth dose and the field size in water phantom and homogenous actual planning. In our work, the dose distribution at different depths (zero-18 cm) deep at1cm interval treated with field size (10×10 and 20×20) cm2 were studied. Results show that high similarity between water phantom and actual planning for
... Show MoreThe knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony
... Show More