<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Solid waste is considered to be one of the rescuers of pollution in case of neglecting conditions and procedures relating to specific processes of laws, systems, and contracts requirements in addition to recommendations of organizations concerned with environment issue. The environments auditing groups of intosai have taking into account the environments control by various conference and recommended that the Board of supreme audit have and environments controlling taking into consideration auditing procedures on waste management ,and also offered on evidences for experiences of members of countries in order to exchange their knowledge's and experiments .the definition of solid waste and their resources ,risks ,man
... Show MoreAcinetobacter baumannii (A. baumannii ) is considered a critical healthcare problem for patients in intensive care units due to its high ability to be multidrug-resistant to most commercially available antibiotics. The aim of this study is to develop a colorimetric assay to quantitatively detect the target DNA of A. baumannii based on unmodified gold nanoparticles (AuNPs) from different clinical samples (burns, surgical wounds, sputum, blood and urine). A total of thirty-six A. baumannii clinical isolates were collected from five Iraqi hospitals in Erbil and Mosul provinces within the period from September 2020 to January 2021. Bacterial isolation and biochemical identification of isolates
... Show MoreCombination of natural poly-phenolic compounds with chemotherapeutic agents is recently being a novel strategy in cancer therapy researches owing to their potential antioxidant and anti-inflammatory properties that modulate several intracellular signaling pathways.
Resveratrol and Baicalein are well known poly-phenolic compounds that belong to stilbene and flavone subclasses, respectively.
This study aims to investigate the possible enhancement effect of resveratrol and Baicalein when combined with doxorubicin using a different combination ratio and applied on two cancer cell lines: HCT116 (colorectal cancer cells) and HepG2 (hepatocellular cancer cells). It also investigates the possibility of such natural compounds to p
... Show MoreThe expression is a prominent feature of the Arabic language, but it is one of the characteristics that are inseparable from it. The expressive aspects of each other.
The issue of Arab differences and their impact on the divergence of meaning is one of the issues that have preoccupied the minds of the Arabic language owners and their views went to various doctrines. Introduction: (Whenever I finished a question concluded with a verse related to any download, and followed by the need for expressing, interpretation and interpretation) I found him in some of the Aarabip more than the face of some of the vocabulary raised and erected and a jar, when the verses of the Koran, resulting in a research lies between Grammar and the Koran under
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More