Preferred Language
Articles
/
alkej-501
Guiding Mobile Robot by Applying Fuzzy Approach on Sonar Sensors
...Show More Authors

This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program  uses the Advanced Robotics Interface for Applications (ARIA), it is programmed with C++ package ( Visual C++.Net ), and Networking software is used for setup Wireless TCP/IP Ethernet-to-Serial connection between robot and PC. The results show that the developed mobile robot travels successfully from one location to another and reaches its goal after avoiding all obstacles that are located in its way. The platform mobile robot is a Pioneer 3 DX that is equipped with Sonar sensors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of The Iraqi University
Exclusion optimal portfolio from outlier by using fuzzy c-means clustering - analytical research at the Iraqi Stock Exchange
...Show More Authors

This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of Lean Management Approach on Human Resource Management Practices A field research in telecom companies in Iraq (Zain-Asia cell)
...Show More Authors

Abstract

The current research is attempt to test the reflection of the lean management on the human resources management practices of two of the most important communication companies operating in Iraq (`Zain & Asia cell), The research aims to Determine the extent of adoption of the lean management approach in the two researched companies, as it improving human resource management practices. The research problem represented in the existence of lack of in some aspects of the application the lean management approach in service sector and neglecting the impact of its tools on the human resource management practices. For this purpose three principle research hypotheses has been formulated, first there is a correlation rel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Man's Dilemma in Harold Pinter's Play The Birthday Party
...Show More Authors

 

     Harold Pinter often portrays the dilemma of obliterated figures that are incapable of feeling of their own existences. These figures feel exhausted and frustrated in a world that deprives them their humanity. They retreat into a limited world where they look for security and protection. The characters' feeling of security is threatened by outside forces represented by intruding persons who stand for the mysterious powers that are indefinable. The conflict between these intruders and the characters finally ends with the characters’ defeat. The reason for the intruders' attack on the victims remains ambiguous and is not explained. The element of mystery pervades Pinter's plays and represents one of

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Robust Computed Torque Control for Uncertain Robotic Manipulatorss
...Show More Authors

This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem.  The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 14 2025
Journal Name
Journal Of Physical Education
The impact of proposed approach for flexibility and agility in learning some basic skills on the table land movements in the artistic gymnastics
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Applying Nuclear Slidell Model To Calculate Energy Levels Ti42-44
...Show More Authors

   In this work , we applied the nuclear shell model by using Modified Surface Delta Interaction ( MSDI ) to study the nuclear structure for Ti42-44 nuclei from the calculation of the energy level values and its total angular momentum .      After comperation with the experiment values which found to be rather in good agreement and determined the total angular momentum values of energy levels which are not assigned experimently , as soon as , we certify some values that were not certained experimently .  

View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Applying Some OF Freinet's Instructional Techniques IN Our Educational Institutes
...Show More Authors

Each educational system aims at having an effective way of

teaching that leads to an effective learing.This needs preparing good inputs in their standard qualifications and good effective ways in the phae of processes during which reliable and valid methods and technjqucs of teaching are used.

Instructional techniques have gained, lately, an increasing and

great attention of educationists because of their many techniques arc Frcinet's  which they can be applied in our cducutional institution (schools, institutes and colleges),after giving a brief profile of Frcint

and  his educa      tiona! ideas and  his innovations in the field of

instructional techniques.<

... Show More
View Publication Preview PDF