Abstract
This paper presents mechanical and electrical design, and implementation process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThis research paper tries to show the significance of the narrative structure in the television advertisement and its connotations. The researchers chose the annual advertisement of Zain Mobile Telecommunication Company for the year 2020, which shed light on the global Corona pandemic crisis. The idea of the advertisement won wide approval as it focused on the suffering that everyone is witnessing like medical and security personnel in particular, and family relationships consequences.
In addition to the positive global interaction with the message presented by the Company in these exceptional circumstances. The advertisement, which lasted for 2.35 minutes, exceeded 13 million views in a short period of time. This prompted us to choos
Ruthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show MoreDensity functional theory (DFT) with B3LYP level and 6-311G[Formula: see text] basis sets for light atoms like N and O and SDD basis sets for heavy atoms like Sn is used to examine the interaction of tin dioxide nanocrystals with nitrogen dioxide as a function of temperature from 273[Formula: see text]K to 373[Formula: see text]K through a Gaussian 09W software program. Gibbs free energy, enthalpy, and entropy of activation and reaction are calculated. The situation of transition of SnO2 clusters toward nitrogen dioxide is investigated. According to the findings, the activation energy of SnO2 clusters with nitrogen dioxide increases as the temperature rises (in negative value). Gauss view 0
... Show MoreReverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show More