In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and construction, and then a successful and guaranteed path from a start to goal configuration has been obtained without any collision probability. The results had been achieved by (Matlab R2015a) software, which run on Intel (R) Core (TM) i3-3120M CPU.
The attention of civil society organizations, governments and international non-governmental organizations in recent years has focused on the acute practices adopted by companies with the aim of reducing the tax burden, and the results of these practices have a negative impact on the tax revenues that the state uses to finance public needsThe aim of the research is to measure the impact of the voluntary disclosure of companies on tax planning for the period from 2011 to 2015 and the research community is in the General Tax Authority. The research sample is 6 companies within the private sector in the financial, banking, insurance and industrial fields. The research was based on a special model to measure the optional disclosure,
... Show MoreWith the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreThe aim of this research is to identify the availability of visual thinking skills in the chemistry textbook scheduled for the third intermediate grade for the academic year (2020-2021) in the Republic of Iraq. The study sample consisted of all (85) images contained in the chemistry course for the third intermediate grade, which are (85) form using the curriculum. Analytical descriptive A list of visual thinking skills was prepared, and the unit of form was adopted as a unit of analysis and repetition as a unit of counting, and frequencies and percentages were used for statistical treatment, and validity and reliability were calculated. And using the Holste equation. The following results were reached: The skill
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis research is an attempt to explore a social and pragmatic phenomenon of lamentation in elegies of Gray and AL-Khansaa' who represent two different cultures. It illustrates the intended meaning of lamentation in English and Arabic and finds how the two languages express this purpose of poetry by analysing it socio-pragmatically adopting Searle's models (1969),and its modifications. Lamentation is considered as a mournful poem lamenting the death of whole humanity as Gray's elegy and of an individual as AL-Khansaa's elegy. So, Gray portrays a universal picture concerning his lamentation, while AL-Khansaa' portrays an individual and subjective picture regarding her lamentation. As branches of linguistics, sociolinguistics de
... Show More