Preferred Language
Articles
/
alkej-551
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO) technique. Moreover, this work focuses on computational part of motion planning in completely changing dynamic environment at every motion sample domains. Since the environment type that discussed here is a known dynamic environment, the solution approach can be off-line. The main advantage of the off-line planning is that a global optimal path solution is always obtained, which is able to overcome all the difficulties caused by the dynamic behavior of the obstacles. A mixing approach of robot path planning using the heuristic method D* algorithm based on optimization technique is used. The heuristic D* method is chosen for finding the shortest path. Furthermore, to insure the path length optimality and for enhancing the final path, PSO technique has been utilized. The robot type has been used here is the two-link robot arm which represents a more difficult case than the mobile robot. Simulation results are given to show the effectiveness of the proposed method which clearly shows a completely safe and short path.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Fri Sep 01 2023
Journal Name
International Journal Of Biological Macromolecules
Optimization and characterization of carrageenan/gelatin-based nanogel containing ginger essential oil enriched electrospun ethyl cellulose/casein nanofibers
...Show More Authors

View Publication
Scopus (30)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
The Impact of Osteoporosis on Teeth Decay in relation to Salivary Vitamin D among Menopause in Baghdad city, Iraq
...Show More Authors

 

Background: Osteoporosis is a systemic skeletal disorder that has an impact on general health, dental health and salivary composition. The mineralization of teeth happens simultaneously with that of the skeleton, but if mineral metabolism is disrupted, tooth failures will resemble those that affect bone tissue. Vitamin D plays a key role in bone and tooth mineralization.

Objective: to evaluate the impact of osteoporosis on teeth decay in relation to salivary vitamin D among menopause in Baghdad city.

Subjects and Methods: This study was cross sectional study. The study group consists of

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Post-Abortion Family Planning Counseling Program on Nurses and Midwives' Practices in Middle Euphrates Maternity Hospitals
...Show More Authors

Objectives: To determine the effectiveness of post-abortion family planning counseling program on nurses and midwives' practices and to predict the variables which may effect on their practices Methodology: A quasi experimental study was conducted from 23th April 2017 to 14th March 2018 in three governorates in Middle Euphrates of Iraq: (Holy Karbala, Al - Najef Al Ashraf and Babylon) on nurses and midwives who work at maternity hospitals. Systematic random sampling was used to select 122 nurses and midwives, (60) of them for study group and (62) for control group. A checklist is an instrument that evaluate the practices which included 50 items. Validity of content was determined through reviewing it by (16) experts and reliability of to

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Optimization of Cutting Parameters on Delamination of Drilling Glass-Polyester Composites
...Show More Authors

This paper attempted to study the effect of cutting parameters (spindle speed and feed rate) on delamination phenomena during the drilling glass-polyester composites. Drilling process was done by CNC machine with 10 mm diameter of high-speed steel (HSS) drill bit. Taguchi technique with L16 orthogonal layout was used to analyze the effective parameters on delamination factor. The optimal experiment was no. 13 with spindle speed 1273 rpm and feed 0.05 mm/rev with minimum delamination factor 1.28.                                       &

... Show More
View Publication Preview PDF