This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of ACO algorithm for the same problem with the same environmental conditions by providing the shortest path for multiple testing environments.
The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreBackground: Laser urinary stone lithotripsy is an established endourological modality. Ho:YAG(2100nm) laser have broadened the indications for ureteroscopic stone managements to include larger stone sizes throughout the whole urinary tract.
Purpose: To evaluate the effectiveness and safety of Holmium: YAG(2100nm) laser lithotripsy with a semirigid uretero scope for urinary stone calculi in a prospective cohort of 17 patients.
Patients and Methods: Holmium: YAG(2100nm) laser lithotripsy was performed with a semirigid ureteroscope in 17 patients from September 2016 to December 2016. Calculi were located in the lower ureter in 9 patients (52.9%), the midure
... Show MoreA digital elevation model (DEM) is a digital representation of ground surface topography or terrain. It can be represented as a raster (a grid of squares) and it is commonly estimated by utilizing remote sensing techniques, or from land surveying. In this research a 3D building of Baghdad university campus have been performed using DEM, where the easting, northing, and elevation of 400 locations have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from QuickBird satellite sensor (with spatial resolution of 0.6 m). This image has been geo-referenced by selecting ground control points of the GPS. The rectification is running, using 1st order polynomial transformation.
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreBackground: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the
... Show More