In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet function. This approach has been performed very successfully, with better results
obtained with the FFNN with modified wavelet activation function (FFMW) when compared with classic
FFNN with Sigmoid activation function (FFS) .One can notice from the simulation that the FFMW can be
capable of identifying the 4-Links of SCARA robot more efficiently than the classic FFS.
In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreIt is not often easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom, a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.
In present work, new tetra-dentate ligand, titled 3,5-bis ((E)-5-Bromo-2-hydroxy benzylidene amino) benzoic acid (H3L), was prepared via an acid-catalyzed condensation process. New four metallic ligand complexes with Co(II), Ni(II), Cu(II) and Zn(II) ions, were also prepared from the refluxing of equivalent moles. Ligand's structure and its complexes; were confirmed by numerous characterization methods, including Ultraviolet-Visible, Infrared, Mass Spectrometer, 1H and 13C Nuclear Magnetic Resonance spectra, atomic absorption, magnetic moments, and molar conductivity measurements. The results of the spectroscopic analyzes proved that the prepared ligand acts as tetradentate bi-ionic ligand and it was bond
... Show MoreThe business process re-engineering is one of the popular concepts at this time because its provide a radical solution for the problems that companies faces. This method appeared because the changes of competition and costumers 'desires at the two last decades. The markets become wider because of the globalization so the companies must change its way to stay a life.
The research aim is to concentrate on the BPR because it's a philosophy aims to re-organize the company's business process to achieve the competitive advantage, the research also aims to a plicate the BPR using cost management technique in the State Company of Vegetable Oils Industry.
&nb
... Show MoreVoice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MorePlanning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.
Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.
The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas
... Show MoreCognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show More