Preferred Language
Articles
/
joe-1136
Simulation of Pose to Pose Moving of the Mobile Robot with Specified GPS Points
...Show More Authors

The applications of mobile robots in rescue scenarios, surviving to search, and exploration for outdoor navigation have received increasing attention due to their promising prospects. In this paper, a simulation of a differential wheeled mobile robot was presented, implementing a Global Positioning System (GPS) data points to specified starting points, final destination, and total error.

In this work, a simple kinematic controller for polar coordinate trajectory tracking is developed. The tracking between two points, pose to pose, was specified by using the GPS data points. After that, the geodesy (GEO) formulation was used to convert the geodesy coordinate to Euclidean or polar coordinate. The Haversine equation obtained the distance between the two points.

The system performance and stability of the tracking controller are proved using the Lyapunov theorem of the stability. A python script was used in this work as a simulator. Computer simulation with pose to pose trajectory strategy conform to the simplicity of the proposed controller.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Mustansiriyah Journal Of Sports Science
The use of training methods in accordance with special exercises to develop flexibility and perform the skills of shooting from above the chest (abduction) to wrestlers ages (14-15)"
...Show More Authors

Evolution has become a feature of this era because of the speed that makes it open multiple horizons and many to identify everything that is new in different areas and also characterized by the competitive position of emotional attitudes changing depending on the positions of winning and defeat, and the use of training methods are the most important pillars of the game of wrestling, The methods contribute to raising the level of the wrestler and refining his physical and skill potential. The problem of the research is that the shooting exercises from above the chest are very important in Roman wrestling and can be terminated by the player. Through very personal interviews for coaches and concluded that there is a weakness in the level of fl

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Modeling and Simulation of Copper Removal from the Contaminated Soil by a Combination of Adsorption and Electro-kinetic Remediation
...Show More Authors

Electro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
A Study of the Influence of Steel Brushes in Rail Surface Magnetic Flux Leakage Detection Using Finite Elements Simulation
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The redesign of the accounting system to banks in the local environment in accordance with international Islamic banking applications
...Show More Authors

At the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .

After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present ,  He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
J Dermatol Venereol
Clinical and histopathological evaluation of pigmented morphea with new insight in relation to etiopathogenesis of the disease
...Show More Authors

KE Sharquie, AA Noaimi, E Abdulqader, WK Al-Janabi, J Dermatol Venereol, 2020 - Cited by 6

View Publication
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Simulation and its applications in contemporary graphic design
...Show More Authors

   The simulation is the oldest theory in art, since it appeared in the Greek aesthetic thought of the philosopher Plato, as we find in many of the thinkers and philosophers over a wide period of time to reach our world today. Our fascination with art in general and design art in particular is due to the creativity and innovations of the artist through the simulation, as well as the peculiarities in this simulation, which give objects signs and signals that may have an echo that sometimes does not exist in their physical reality.

   The real representation of life and design construction, descriptions of the expression of each of them in the form of intellectual construction and the ideas of producti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (86)
Crossref