In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet function. This approach has been performed very successfully, with better results
obtained with the FFNN with modified wavelet activation function (FFMW) when compared with classic
FFNN with Sigmoid activation function (FFS) .One can notice from the simulation that the FFMW can be
capable of identifying the 4-Links of SCARA robot more efficiently than the classic FFS.
Background: Vibration decreases the viscosity of composite, making it flow and readily fit the walls of the cavity. This study is initiated to see how this improved adaptation of the composite resin to the cavity walls will affect microleakage using different curing modes
Materials and methods: Standard Class V cavities were prepared on the buccal surface of sixty extracted premolars. Teeth were randomly assigned into two groups (n=30) according to the composite condensation (vibration and conventional) technique, then subdivided into three subgroups (n=10) according to light curing modes (LED-Ramp, LED-Fast and Halogen Continuous modes). Cavities were etched and bonded with Single Bond Universal
... Show MoreImage compression is a suitable technique to reduce the storage space of an image, increase the area of storage in the device, and speed up the transmission process. In this paper, a new idea for image compression is proposed to improve the performance of the Absolute Moment Block Truncation Coding (AMBTC) method depending on Weber's law condition to distinguish uniform blocks (i.e., low and constant details blocks) from non-uniform blocks in original images. Then, all elements in the bitmap of each uniform block are represented by zero. After that, the lossless method, which is Run Length method, is used for compressing the bits more, which represent the bitmap of these uniform blocks. Via this simple idea, the result is improving
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIs the efficiency of physical and your endurance is of great importance for some activities and field, as it whenever the situation has improved student career was able to perform physical exertion more with energy saving efforts, so the identification of physical aptitude and endurance private students, was based on that there are positively correlated the carrying of training and pregnancy fact on the shoulders of the student. In other words, physical aptitude and endurance in your control level that can be shown by the student during the performance of training and competitions. Therefore, lies the importance of research to test physical aptitude and endurance your help to reveal the career of the body in the light of their relationship
... Show MoreThe innate art,is a major tributary in the art world, It is a bold achievement, has a special flavor, With self-identity, linked to the origins and roots of human ,That goes back to the past and the history and culture of peoples. This business is not limited to only aesthetic side, but is loaded with religious and magical experience, and have social functions, This creations stayed live, breathe, grow, and change with the transformation of society, these processors emerged, from local people have not been trained academically.Their Elvis came from community culture,Which are, Mesopotamian thoroughbreds.This culture that we desperately need today, in order to increase ourselves Iraqi force, In the face of the modern world, which is locke
... Show MoreBackground: The displacement of artificial teeth during complete denture construction presents major processing errors in the occlusal vertical dimension which were verified at the previous trial denture stage. The aim of this study was to assess the effect of delay in processing after final flask closure and tension application on the vertical acrylic and porcelain teeth displacement of complete dentures constructed from heat cured acrylic and the results were compared with the conventional processing method. Materials and methods: forty samples of identical maxillary complete dentures were constructed from heat polymerized acrylic resin. These samples were subdivided into the following experimental subgroups in which each subgroup contai
... Show MoreXanthomonas axonopodis pv glycines (Xag) is a pathogen that causes pustule disease in soybeans. Many
techniques for controlling this disease have been widely developed, one of which is the use of biological agents.
Bacillus sp. from the soybean phyllosphere is a biological agent that has the potential to suppress the
development of pustule disease. One of the biological control mechanisms is through biochemical induction
of plant resistance which includes the accumulation of phenols, salicylic acid compounds, and peroxidase
enzymes. Bacillus subtilis JB12 and Bacillus velezensis ST32 are two bacteria isolated from the soybean
phyllosphere which have previously been known to suppress Xag through an anti
1-[4-(4-Acetyl-2-hydroxy-phenylazo)-phenyl]-ethanone (L1) and 1-[3-Hydroxy-4(4-nitro-phenylazo)-phenyl]-ethanone (L2) were readied by combination the diazonium salts of amines with 3-hydroxyacetophenone. (C.H.N) analyses, infrared spectra, UV–vis electronic absorption spectra, 1H and 13CNMR spectral mechanisms are use to identified of the ligands. Complexes of Ni+2 and Cu+2 were performed as well depicted. The formation of complexes has been identified by using atomic absorption of flame, elemental analysis, infrared spectra and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied obeyed the mole ratio and continuous contrast methods, Beer's law followed during a concent
... Show More