The aim of robot path planning is to search for a safe path for the mobile robot. Even though there exist various path planning algorithms for mobile robots, yet only a few are optimized. The optimized algorithms include the Particle Swarm Optimization (PSO) that finds the optimal path with respect to avoiding the obstacles while ensuring safety. In PSO, the sub-optimal solution takes place frequently while finding a solution to the optimal path problem. This paper proposes an enhanced PSO algorithm that contains an improved particle velocity. Experimental results show that the proposed Enhanced PSO performs better than the standard PSO in terms of solution’s quality. Hence, a mobile robot implementing the proposed algorithm operates better and is more secure.
Despite the vast areas occupied by deserts in the world, it is still far from the civilized development and development of the other regions, so they became semi-neglected areas that extend to the hand of urbanization only in specific places and for special purposes, due to the harsh natural conditions surrounding it and to the accuracy The ecological balance in it became the greatest enemy of human beings in the desert areas is the same person who paved the way for increased intervention in the exploitation of natural resources and increase the demand for them to drain seriously affect the impact and still on the environmental and climatic conditions and thus living for the inhabitants of these Areas. The main potential for deve
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol
... Show MoreThe objectives of this research are to determine and find out the reality of crops structure of greenhouses in association of Al-Watan in order to stand on the optimal use of economic resources available for the purpose of reaching a crop structure optimization of the farm that achieves maximize profit and gross and net farm incomes , using the method of linear programming to choose the farm optimal plan with the highest net income , as well as identifying production plans farm efficient with (income - deviation) optimal (E-A) of the Association and derived, which takes into account the margin risk wich derived from each plan using the model( MOTAD), as a model of models of linear programming alternative programming m
... Show MoreThe Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe seventh international scientific conference held at the "University of Baghdad" College of Education "Ibn Rushd" 14-15 / 4/2019, confirmed in its recommendations the need to draw clear strategic planning to invest the qualitative inputs from the Ministry of Education and focus on it in higher education, which requires educational institutions to amend from its current strategies or adopting new strategies in a way that contributes to presenting new ways to compete and keep pace with scientific progress and to find realistic and objective working methods. The aim of the current study is to identify the reality of university strategic planning to invest the outputs of the distinguished schools of the heads of public universities. The r
... Show More