Preferred Language
Articles
/
alkej-442
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and construction, and then a successful and guaranteed path from a start to goal configuration has been obtained without any collision probability. The results had been achieved by (Matlab R2015a) software, which run on Intel (R) Core (TM) i3-3120M CPU.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Features of news coverage during Covid-19 crisis: Content analysis on a sample of global news accounts on Twitter
...Show More Authors

This study aims to analyze the messages of a number of global news outlets on Twitter. In order to clarify the news outlets tactics of reporting, the subjects and focus during the crisis related to the spread of the Covid-19 virus. The study sample was chosen in a deliberate manner to provide descriptive results. Three news sites were selected: two of the most followed, professional and famous international news sites: New York Times and the Guardian, and one Arab news site: Al-Arabiya channel.

A total of 18,085 tweets were analyzed for the three accounts during the period from (1/3/2020) to (8/4/2020). A content analysis form was used to analyze the content of the news coverage.   The results indicate an increase in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Studying the genotype of Aryl Hydrocarbon Receptor-Interacting Protein (AIP) Gene (rs641081C>A) in ‎Iraqi Samples with Acromegaly Pituitary Adenoma
...Show More Authors

Pituitary adenomas are the anterior pituitary tumors. Patients with an Aryl Hydrocarbon Receptor-Interacting Protein (AIP) mutation (AIP- mut) tend to have more aggressive tumors occurring at a younger age. Single nucleotide polymorphisms (SNPs) in many studies have been related to metabolic comorbidities in the general population. Study aims investigated the role of AIP gene SNPs with susceptibility to acromegaly pituitary- adenoma, with levels of LH, FSH, TSH, Testosterone, IGF1,GH, FT4 , Prolactin hormones and blood sugar levels.  The study ‎was conducted on a group of acromegaly patients, including 50 patients) both Genders( with ‎hyperplasia of the ends, and apparently healthy control group. Genotyping of

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application
...Show More Authors

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Imagination as a Path to Reality
...Show More Authors

Imagination as a Path to Reality

View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Modified BFGS Update (H-Version) Based on the Determinant Property of Inverse of Hessian Matrix for Unconstrained Optimization
...Show More Authors

The study presents the modification of the Broyden-Flecher-Goldfarb-Shanno (BFGS) update (H-Version) based on the determinant property of inverse of Hessian matrix (second derivative of the objective function), via updating of the vector s ( the difference between the next solution and the current solution), such that the determinant of the next inverse of Hessian matrix is equal to the determinant of the current inverse of Hessian matrix at every iteration. Moreover, the sequence of inverse of Hessian matrix generated by the method would never  approach a near-singular matrix, such that the program would never break before the minimum value of the objective function is obtained. Moreover, the new modification of BFGS update (H-vers

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Airborne Computer System Path-Tracking Based Multi-PID-PSO Controller Design
...Show More Authors

View Publication
Scopus (14)
Crossref (7)
Scopus Crossref