In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet function. This approach has been performed very successfully, with better results
obtained with the FFNN with modified wavelet activation function (FFMW) when compared with classic
FFNN with Sigmoid activation function (FFS) .One can notice from the simulation that the FFMW can be
capable of identifying the 4-Links of SCARA robot more efficiently than the classic FFS.
Consistent "with the thought of tax talk is unified tax natural evolution for him, as the application leads to the inclusion of tax all branches of income and its sources and through truncated part of this entry through the application of price ascending it, it means the procedures of tax reform. Taxes on total income characterized by giving a clear picture of the total income of the taxpayer and its financial situation and its burden family which allows granting exemptions, downloads, and application of prices that fit this case. This requires reconsideration of the structure of the tax system in force and the transition from a system specific taxes to the tax system on the total income of the integration of income from the rental of re
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThis study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.
A total of 13 samples of domestic cat Felis cattus (Linnaeus, 1758 ) and 9 samples of wild cat Felis chaus furax (de Winton, 1898) of the Felidae Family were trapped and examined to detect the hard ticks. The areas of the collection were: Baghdad, Al-Rashidiya, Tharthar, Nahrawan, AL-Mahmoudiya (middle of Iraq) and AL-Haretha (south of Iraq), Mosul (north of Iraq). The results of the current study revealed that four species belong to two genera of hard ticks: Haemaphysalis sp. (Koch, 1844), Rhipicephalus turanicus (Morel, 1969), Rhipicephalus sanguineus (Neumann, 1904) and Rhipicephalus appendiculatus (Santos, 1955). The rates and the density of infestation were discussed. The current study aimed to clarify the infestation differe
... Show MoreA total of sixty raw milk samples were collected from (street vendors and shops) from Baghdad city, Iraq. The samples were inoculated into peptone water and, then, subcultured onto MacConkey agar and Blood agar. Identification of isolates was confirmed by microscopic examination, cultural characteristic, biochemical tests, Vitek (VITEK®2 system), and Biolog GN substrate reactions followed by 16S rRNA and specific genes sequencing. Of 60 raw cow’s milk samples, Providencia spp. were identified only in 4 samples (6.67%) and P. rettgeri was the most common, 2/4 (50%), followed by P. stuartii and P. vermicola, 1/4 (25%). Antimicrobial susceptibility tests were conducted against ten antibiotics by the disc diffusion method. All Provid
... Show MoreLung cancer is the most common dangerous disease that, if treated late, can lead to death. It is more likely to be treated if successfully discovered at an early stage before it worsens. Distinguishing the size, shape, and location of lymphatic nodes can identify the spread of the disease around these nodes. Thus, identifying lung cancer at the early stage is remarkably helpful for doctors. Lung cancer can be diagnosed successfully by expert doctors; however, their limited experience may lead to misdiagnosis and cause medical issues in patients. In the line of computer-assisted systems, many methods and strategies can be used to predict the cancer malignancy level that plays a significant role to provide precise abnormality detectio
... Show MoreWater is a resource and a crucial aspect of living and surviving. In Iraq, the Tigris River is one of the most critical water sources. The present study aimed to provide an insight analysis of some water quality parameters including the microbial content of drinkable tap water and river water. Ten Water samples (T1- T10) in triplicate were collected from sampling sites -Site I (Tap water) from home water taps, supplied by the Water Filtration Station/ Al Karama Project/ Al-Karkh> 10 from Site II (R1- R10)River water from Tigris River (around or near the Water Filtration Station/ Al Karama Project) every week (from September to half of November 2022), then were immediately placed in sterile bottles and transported to Microbiolo
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show More