Robot manipulator is a multi-input multi-output system with high complex nonlinear dynamics, requiring an advanced controller in order to track a specific trajectory. In this work, forward and inverse kinematics are presented based on Denavit Hartenberg notation to convert the end effector planned path from cartesian space to joint space and vice versa where a cubic spline interpolation is used for trajectory segments to ensure the continuity in velocity and acceleration. Also, the derived mathematical dynamic model is based on Eular Lagrange energy method to contain the effect of friction and disturbance torques beside the inertia and Coriolis effect. Two types of controller are applied ; the nonlinear computed torque control (CTC) and the simpler form of its Proportional Derivative plus Gravity (PD+G) where they are designed to reduce the tracking trajectory errors which tend to zero where the used Kp and Kv gains are 900,60. Also, the RMS errors for tracking a step input of CTC were equal to [2.5E-14, 4.4E-14, 5.0E-14, -4.7E-14, -3.9E-14, -4.6E-14] (deg) and of PD+G were equal to [-1.77E-5, -1.22E-6, -4.28E-6, -8.97E-6, -1.32E-5, 1.05E-5] (deg) for joints one to six, respectively. The results show that CTC is more accurate but requires additional acceleration input and is more computationally extensive and PD+G controller is performed with acceptable tracking errors in manipulator position control applications.
Abstract
Objective (s): To evaluate reasons for partial compliance and non-compliance to the
routine childhood vaccination schedule in Al-Karkh district
Methodology: Descriptive study , using the evaluation approach, is carried throughout the present study to determine the reasons for the Routine Childhood Vaccination at health care sectors and primary health care centers at Al-Karkh District in Baghdad City, Convenient, non-probability, sample of (90) mother who are recruited from health care sectors at Al-Karkh District in Baghdad City. All mothers, who ha
... Show MoreObjectives: The aim of the study is to evaluate the information of caregivers concerned emergency care for the elderly and to identify the relationship between caregiver information and their educational level, years of service and training courses. Methodology: A quasi-experimental study was conducted in the Geriatric Care Home in Baghdad City (the governmental and private geriatric care home ) for the period from October, 14th , 2018 to March, 20th , 2019 to find the effectiveness of the instructional program on caregivers knowledge about emergency care for the elderly.. A purposive sample (non-probability) was consisting of (30) males and females caregivers, the sample was selected from geriatric care home in Baghdad city .To implemen
... Show MoreAim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables
We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: COVID-19 pandemic has influenced all life aspects; Dental staff, like other healthcare providers, may be exposed to COVID-19 as part of their work and its psychological impacts on healthcare workers should not be ignored
Objectives: To assess the anxiety, and fear from COVID-19 pandemic in dentists working in specialist dental centers: sample the Al-Resafa health directorate, and its relation between the anxiety, and COVID-19 fear with some of their demographic variables
Subjects and Methods: A cross-sectional study was conducted on 2nd Jan. to 14th Feb. 2021, by an electronic version of questionnaire through Google-form; the questionnaire was formed based on Mental-Health-American-Org
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More