Preferred Language
Articles
/
alkej-330
Solving the Inverse Kinematic Equations of Elastic Robot Arm Utilizing Neural Network
...Show More Authors

The inverse kinematic equation for a robot is very important to the control robot’s motion and position. The solving of this equation is complex for the rigid robot due to the dependency of this equation on the joint configuration and structure of robot link. In light robot arms, where the flexibility exists, the solving of this problem is more complicated than the rigid link robot because the deformation variables (elongation and bending) are present in the forward kinematic equation. The finding of an inverse kinematic equation needs to obtain the relation between the joint angles and both of the end-effector position and deformations variables. In this work, a neural network has been proposed to solve the problem of inverse kinematic equation. To feed the neural network, experimental data were taken from an elastic robot arm for training the network, these data presented by joint angles, deformation variables and end-effector positions. The results of network training showed a good fit between the output results of the neural network and the targets data. In addition, this method for finding the inverse of kinematic equation proved its effectiveness and validation when applying the results of neural network practically in the robot’s operating software for controlling the real light robot’s position.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Nov 01 2022
Journal Name
Alustath
Metrical Phonology in Classical English and Arabic Poetry: A Contrastive Study
...Show More Authors

One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the

... Show More
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Psychological contents As Deduced From Al Namel Surah, Dialogue between Suliman and Hodhod bird & Their Application In School Counseling
...Show More Authors

The current research aimed at deducing the psychological contents of Suliman dialogue with the Hodhod and statement applications in school counseling. The researcher followed the Islamic approach in the search, which deals with the study of events, phenomena and practices through a broad understanding of Islamic principles and limitations associated with the general framework of Islam. In addition to the deductive approach is derived from a sub-rule is a general provision.
The research revealed many of the psychological contents, including: the importance of continuing care counselor psychological learners, and follow-up field to their problems, conditions, listen good horseshoe to defend himself, clarify the motives of his ac

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jul 06 2025
Journal Name
Jordan Medical Journal
Enhancing Adherence and Satisfaction with Disease-Modifying Therapies in Multiple Sclerosis Through Pharmacist-Led Interventions: Interventional Study
...Show More Authors

Background: Pharmacists are essential in treating MS. Pharmacists' involvement and patient consultation may improve patient adherence and satisfaction. Aim: To evaluate the influence of pharmacist-led interventions (PLI) on medication adherence and satisfaction in patients with multiple sclerosis receiving disease-modifying therapies (DMTs). Methods: This study was conducted on patients with relapsing-remitting multiple sclerosis who were receiving DMTs and attended a neurological consultant clinic in the medical city of Baghdad. It was a pre-post-intervention study. Each patient underwent two educational sessions: the first session took place at the beginning of the study, after completing the Arabic version of the treatment satisfaction q

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Inorganica Chimica Acta
Synthesis, characterisation and electrochemistry of eight Fe coordination compounds containing substituted 2-(1-(4-R-phenyl-1H-1,2,3-triazol-4-yl)pyridine ligands, R = CH3, OCH3, COOH, F, Cl, CN, H and CF3.
...Show More Authors

Eight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref