Aerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance control of the aerial payload transmission process. The impedance control technique is implemented to develop the target impedance based on emerging the mass of the payload and the model of the gripper fingers. Tracking the position of the interactional point between the fingers of gripper and payload, inside the impedance control, is achieved using model predictive control (MPD) approach. The developed on-board DT offered a model where interaction with the unknown payload and aerial robot dynamics is informed. Beside this, the results showed the ability of the introduced DT to foretell the conditions of the forces acting on the payload which helped to predict the situation of aerial manipulation process. Additionally, the results showed that the DT model could detect real-time errors in the physical asset.
This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show MoreWith the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify
The general objective of the research is to better understand changes in land cover and their impact on climatic factors by measuring changes in land cover for the Baghdad city for the period 1999-2021 and evaluating changes in land cover and measuring changes in climatic factors (relative humidity and evaporation). This study from 1999 to 2021 and in two different seasons: the April of the growing season and August the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes, the study showed the spatial variations in LC from 1999 to 2021 as follows: increase in the vegetation and water bodies during April and decrease this in August while the soil and built up decreas
... Show MoreIn this study, the harvest of maize silage with the cross double row sowing method were tested with a single row disc silage machine in two different PTO applications (540 and 540E min-1) and at two different working speeds v1, v2 (1.8 and 2.5 km h-1). The possibilities of harvesting with a single row machine were revealed, and performance characteristics such as hourly fuel consumption, field-product fuel consumption and PTO power consumption were determined in the trials. The best results in terms of hourly fuel consumption and PTO power consumption were determined in the 540E PTO application and V1 working speed. When the fuel consumption of the field-product is evaluated, it is obtained with V2 working speed and 540E PTO application. As
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More