Preferred Language
Articles
/
vxeWNY8BVTCNdQwCJ2Gf
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Simulation of Pose to Pose Moving of the Mobile Robot with Specified GPS Points
...Show More Authors

The applications of mobile robots in rescue scenarios, surviving to search, and exploration for outdoor navigation have received increasing attention due to their promising prospects. In this paper, a simulation of a differential wheeled mobile robot was presented, implementing a Global Positioning System (GPS) data points to specified starting points, final destination, and total error.

In this work, a simple kinematic controller for polar coordinate trajectory tracking is developed. The tracking between two points, pose to pose, was specified by using the GPS data points. After that, the geodesy (GEO) formulation was used to convert the geodesy coordinate to Euclidean or polar coordinate. The Haversine equation

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Factores lingüísticos y extralingüísticos de la evolución semántica de los términos Linguistic and non-linguistic factors of the semantic evolution of terms
...Show More Authors

La disciplina sémantica siendo una rama de la lingüística y relacionada con los significados que residen detrás de los vocablos sería muy intereseante ser estudiada y investigada, sobre todo cuando tratamos de penetrarnos dentro de la evolución semántica y los motivos por los que se suceden estos cambios. Pues, es injusto dejar de dar una definición aclaratoria sobre esta disciplina y sus componentes.

El significado de los léxicos que se forma por un conjunto de semas o rasgos significativos mínimos. Sin embargo, no todos esos semas son igualmente intervenidos por los hablantes de una comunidad lingüística, sino que hay algunos de ellos que siempre están presentes, mientras que otros varían. Es decir, el significado

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Evaluate the Effectiveness of Agaricus bisporus (Spawn) on Control Damping – off Caused by Pythium aphanidermatum on Cucumber
...Show More Authors

This study was conducted to test the effectiveness of Agaricus bisporus inoculums (spawn) in the ratio of (0.25, 0.5 and 1%) v/v to control Pythium aphanidermatum fungus the causal agent of damping- off disease of cucumber plant. results showed the ability of A. bisporus fungus to protect the seedlings from incidence by P. aphanidermatum . all treatments of edible fungus inoculums were significantly different from pathogen treatment after 15 day of planting and there was no significant difference found from control treatment (without pathogen) . the successful of A. bisporus was continued to protect the seedlings after 30 and 45 day after planting. The numbers of seedlings were (8, 7.25 & 7.25) respectively compared to 5.5 seedlings in con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref