A quadruped (four-legged) robot locomotion has the potential ability for using in different applications such as walking over soft and rough terrains and to grantee the mobility and flexibility. In general, quadruped robots have three main periodic gaits: creeping gait, running gait and galloping gait. The main problem of the quadruped robot during walking is the needing to be statically stable for slow gaits such as creeping gait. The statically stable walking as a condition depends on the stability margins that calculated particularly for this gait. In this paper, the creeping gait sequence analysis of each leg step during the swing and fixed phases has been carried out. The calculation of the minimum stability margins depends upon the forward and inverse kinematic models for each 3-DOF leg and depends on vertical geometrical projection during walking. Simulation and results verify the stability insurance after calculation the minimum margins which indicate clearly the robot COG (Center of Gravity) inside the supporting polygon resulted from the leg-tips.
In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 prot
... Show MoreIn this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample
... Show MoreObjectives To determine the prevalence of oral lesions by age and gender among the pediatric population in Iraq. Materials and methods A review of the archives of the oral pathology department of Baghdad University from, 1970 Materials and Methods: A review of the archives of the oral pathology department of Baghdad University from 1970 to 2013 for all biopsies from children aged 0–15 years old. Results A total of 1286 child specimens represented 11.98% of all biopsied lesions. The pyogenic granuloma was the most frequent lesion in children, and the periapical cyst was the most frequent lesion from an odontogenic origin. The incidence of malignant lesions was higher in the 0–3 age group than other groups. Conclusions The majority of les
... Show MoreVaccine hesitancy poses a significant risk to global recovery from COVID-19. To date however, there is little research exploring the psychological factors associated with vaccine acceptability and hesitancy in Iraq.
To explore attitudes towards COVID-19 vaccination in Iraq. To establish the predictors of vaccine uptake and vaccine hesitancy in an Iraqi population.
Using a cross-sectional design, 7,778 participants completed an online questionnaire exploring their vaccination status, likelihood of infection, perc
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreCharacterization is commonly known in stylistics to be the cognitive process in the readers' minds when comprehending a fictional character in a literary work .In one approach, it is assumed that characters are the outcome of the interaction between the words in the text on the one hand and the contents of our heads on the other. This paper is an attempt to understand how characterization is achieved by applying Culpeper’s (2001) model which seems to be to present a method of analysis that is more objective and more systematic in analyzing characters. Two characters are selected for discussion; Ralph and Jack from Golding’s (1954) Lord of the Flies. The novel talks about the corruption of human beings and the capacity of evil th
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show More