Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreThe traction property is one of the important mechanical properties, especially the rotary parts which are subjected to constant and variable loads There are many methods used to improve this property, and the shoot peening by metal balls is considered the most critical one. the study focuses on this characteristic of steel CK35 used in many engineering applications as the rotating shafts and railway This study shows that the fatigue strength is improved by14% after shoot peening with metal balls. The study includs the rehabilitation of damaged samples as a result of fatigue corrosion. The standard solution adopted was 36% MgCl2 with a 30 days immersion period. These samples has been improved by 6% after it decreased by18% d
... Show MoreThis paper is concerned with Double Stage Shrinkage Bayesian (DSSB) Estimator for lowering the mean squared error of classical estimator ˆ q for the scale parameter (q) of an exponential distribution in a region (R) around available prior knowledge (q0) about the actual value (q) as initial estimate as well as to reduce the cost of experimentations. In situation where the experimentations are time consuming or very costly, a Double Stage procedure can be used to reduce the expected sample size needed to obtain the estimator. This estimator is shown to have smaller mean squared error for certain choice of the shrinkage weight factor y( ) and for acceptance region R. Expression for
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreThis work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conduct
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
There are many applied Economic studies that have found positive nexus between financial development and poverty reduction in developing countries. Iraq has witnessed an increasing rate of poverty during the period 1980-2010 due to many internal and external factors such as wars, economic sanctions, inflation, a high rate of unemployment, and political and security instability. Therefore, the investigation about the solutions to reduce poverty becomes very necessary, and enhancing the financial development in Iraq is one of these options. This is due to that the financial development could reduce the poverty rates through two channels: the first is direct via the offering of the loans and other financial facilities to the poor, a
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreThis paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n
... Show More