In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet function. This approach has been performed very successfully, with better results
obtained with the FFNN with modified wavelet activation function (FFMW) when compared with classic
FFNN with Sigmoid activation function (FFS) .One can notice from the simulation that the FFMW can be
capable of identifying the 4-Links of SCARA robot more efficiently than the classic FFS.
Currently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica
... Show MoreAbstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show MoreThe purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).
Metal corrosion is a destructive process for many industrial operations, including oil well acidizing and acid pickling. Therefore, numerous efforts made by many researchers to control the steel corrosion. In the present work, A (E)-4-(((4-(5-mercapto-1,3,4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol (MOPM) has been synthesized and characterized as a new corrosion inhibitor for mild steel in 0.1 M hydrochloric acid. FTIR and 1 HNMR were used in the diagnosis of MOPM, while electrochemical polarization technique was employed to test the performance of inhibitor at various temperatures and inhibitor concentrations. Electrochemical studies showed that MOPM acts as a mixed-type inhibitor with a maximum inhibition efficiency of
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show More<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show More