Papers by Amer Abu Jassar
Journal of Theoretical and Applied Information Technology, 2023
The work is devoted to the study of the features of voice control of a mobile robot and the proce... more The work is devoted to the study of the features of voice control of a mobile robot and the processing of voice commands. For these purposes, standard IT technologies are used. An approach to solving such a problem based on various voice recognition systems is considered. Four main speech recognition systems are described. A system for recognizing voice commands for controlling a robot is considered. A distinctive feature of the proposed system is that the system does not require a permanent connection to the Internet, and the autonomous operation of such a system has the advantage of lower requirements for working with it.

This paper describes the concept of unified modeling of analysis tools, as modeling is regarded a... more This paper describes the concept of unified modeling of analysis tools, as modeling is regarded as useful method for the mechanism planning of devices, machines, individual parts, and assemblies used in mechanical engineering. Modeling is one of the analysis tools that permits to preliminarily study some objects, methods, or developments at given properties; accordingly, modeling tends to understand the nature of those characteristics and then re-creates an object, process, or phenomenon that has a degree of common relationship. Thus, modeling is the process of reflecting and learning some properties with the aim of further recreating these properties and improving them if necessary. On the investigated model of the 3D model for a small-sized portable portal miller, the selection of individual parts of such a tool is shown and justified. Moreover, a diagram of a conveyable portal edge machine with Computer Numerical Control (CNC) has been generalized and developed. Through investigating the modeling and designing the necessary devices and mechanisms, a variety of systems have been studied to explain the reason for choosing the SolidWorks system for modeling types. The choice of individual components of a small-sized portable portal milling machine is demonstrated and justified using the example of making a 3D model. In addition, a generalized and developed block diagram of a portable portal milling machine with CNC has been created, where each element of such a block diagram is described and a recommended selection is made. Finally, individual components of a portable portal milling machine were modeled with CNC …

SN Applied Sciences
Choosing the proper engine that fits the desired application is a crucial design factor in roboti... more Choosing the proper engine that fits the desired application is a crucial design factor in robotics. Accordingly, this paper compares different types of engines for other Industrial robots (IR) and proposes to put practical criteria based on the mechanical design and its application. It starts from describing the IR choice to explaining the synchronous motor with permanent magnets as a base of the motor choice. Particular attention is paid to the consideration of components and their purpose supported by the creation of the subsequent drawings. SolidWorks system was implemented to obtain expressive and high-quality graphics and three dimensions design. Moreover, the entire Electrical Magnetic Force (EMF) was simulated using the method of variational parameterization. Accordingly, a developed synchronous motor with a built-in permanent magnet is proposed, which is supported by 3D design graphics to evaluate the deformation and margin of the housing and motor shaft safety.The obtained...
This work is aimed at analyzing methods of binarization in multimedia systems when recognizing li... more This work is aimed at analyzing methods of binarization in multimedia systems when recognizing license plates of cars. In order to carry out binarization license plates, features of existing (LPC) were first analyzed. A review of most well-known classification of binarization methods was carried out, and on basis of analysis, classification was proposed, which will be divided into four general classes, which distinguishes our classification from known ones. A fallback class has also been added. As result, pros and cons of all binarization methods have been determined.

Computational Intelligence and Neuroscience
This article is aimed at studying the features of the control systems development for a small-siz... more This article is aimed at studying the features of the control systems development for a small-sized Computer Numerical Control (CNC) portative laser engraver. The CNC is implemented in mobile maintenance and repair platforms for remote sensing of the environment where the wild environment may not allow us to access the animals and places. The proposed work in this paper is based on recent research, which shows that applying the automated CNC speeds up the processes of repair, modernizes the equipment size, and significantly reduces the economic costs; accordingly, the authors developed a block diagram of a portable CNC laser engraver. The choice of the hardware was also made, taking into account the possibility of quick replacement in the field, which reduces the repair time and the cost of the developed layout. A control system based on the selected modules was synthesized, and a stability check was carried out using MatLab tools. To check the correctness of the developed control s...

Computational Intelligence and Neuroscience
This paper discusses the development of new hardware and software for protecting access to HMI/SC... more This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis carried out, it is shown that the existing vulnerabilities can be exploited by cybercriminals to steal passwords and user authentication logins. Modern protection technologies based on the OTP method have been investigated. Moreover, a new concept of information security for user authentication in UPNs when working with information remotely is proposed. The structure of the electronic key and the connection diagram based on the selected hardware modules have been developed. In addition, the two-level user identification algorithms and the firmware program code for the ATmega32U4 microcontroller are considered. Finally, to show the reliability and stability of the of the developed electronic user authentication key against any unexpected software hacking, ...
TEST Engineering & Management, Apr 1, 2021
TEM Journal, 2021
Generalized formalization of recognition algorithm for specialized computer systems is presented ... more Generalized formalization of recognition algorithm for specialized computer systems is presented in this paper. The structure features of image recognition methods, which have to be taken into account when developing classifiers for object recognition in specialized computer systems, are described. The fundamental types of images characteristics-features, which are used in various methods of image recognition, are discussed. Approaches to development of classifiers for recognizing robotization objects, which are implemented on basis of Haar classifiers, are discussed. The issues of using machine learning algorithm of adaptive gain AdaBoost for development of such classifiers are also considered. Utilities have been developed for implementation of classifiers for object recognition in specialized computer systems.
International Journal of Engineering Trends and Technology, 2021
The work is devoted to the study of pattern recognition features of industrial parts in individua... more The work is devoted to the study of pattern recognition features of industrial parts in individual fasteners' forms. The main types of neural network architectures and their features are considered. Neural networks are classified into separate categories for ease of perception and analysis. An approach to recognition of hardware products such as fasteners using neural network, which is implemented in Python using Keras machine learning library, is proposed. The main generators are described: for training data, testing, and validation. Codes fragments of corresponding programs for implementation of the proposed approach to pattern recognition of fasteners are presented.

Telecommunications and Radio Engineering, 2018
The analytical approach for analysis the quality of service characteristics of Software-Defined N... more The analytical approach for analysis the quality of service characteristics of Software-Defined Networking is proposed in the paper. Software-Defined Networking is perspective concept that aimed to improving the performance and efficiency of computing networks. Current complexity of networks based this concept requires define the adequate methods for the calculation work characteristics. The model characterized by a Poisson arrival process with parameter λ and service time characterized by hyper-exponential distribution with r phases proposed to use for analysis QoS. Performance analysis using the proposed queuing model indicates that the model is accurate. Such QoS characteristics as maximum flow intensity that can be serving on switch and on controller, average packet sojourn time on single serve elements, delay and CP utilization of serve elements are calculated.
International Journal of Computer Science Issues, 2017
The overview of principles of network load balancing between server platforms in a data center ne... more The overview of principles of network load balancing between server platforms in a data center network is given in the work. The data center model in term of Infrastructure-asa-Service is proposed in the work. The CPU utilization of server platforms and throughput capability which depended from the amount of servers is suggested to use as a main performance characteristics. The evaluation model of data center network and the formulas for CPU and throughput evaluation are also suggested in the work. The analysis of load balancing between server platforms was performed according to the proposed formulas in case of use a clustering.
Telecommunications and Radio Engineering, 2017

Computational Intelligence and Neuroscience
Research in robotics is one of the promising areas in mobile robot development, which is planned ... more Research in robotics is one of the promising areas in mobile robot development, which is planned to be implemented in extreme dangerous conditions of areas explored by humans. This article aims at developing and improving a prototype of zoomorphic mobile robots that are designed to repeat the existing biological objects in nature. The authors performed a detailed analysis on the structure and dynamics of the geometrical family caterpillar movement, which is passed on a practical design implemented to perform the dynamic movement on uneven vertical surfaces. Based on the obtained analysis, the design and kinematic scheme of the movement is developed. Also, the structural control scheme via the Internet technologies that allow carrying out remote control is presented in this paper, considering the dangerous mobile robot work zones. To test the recommended solutions, the authors developed detailed 3D printed models of the mobile robot constructions for the implemented hardware. The mod...

Hindawi , 2022
Research in robotics is one of the promising areas in mobile robot development, which is planned ... more Research in robotics is one of the promising areas in mobile robot development, which is planned to be implemented in extreme dangerous conditions of areas explored by humans. This article aims at developing and improving a prototype of zoomorphic mobile robots that are designed to repeat the existing biological objects in nature. The authors performed a detailed analysis on the structure and dynamics of the geometrical family caterpillar movement, which is passed on a practical design implemented to perform the dynamic movement on uneven vertical surfaces. Based on the obtained analysis, the design and kinematic scheme of the movement is developed. Also, the structural control scheme via the Internet technologies that allow carrying out remote control is presented in this paper, considering the dangerous mobile robot work zones. To test the recommended solutions, the authors developed detailed 3D printed models of the mobile robot constructions for the implemented hardware. The model of the mobile robot is constructed, and the control system with examples of the user program code implementations is performed. Several experiments were performed, which showed the efficiency of the achieved mobile robot for solving problems of vertical movement on uneven metal surfaces. Moreover, the obtained slow motion of the designed robot proves that the simulated robot behaves similarly to the natural behavior of caterpillar movement.
2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), 2015
This paper is devoted to analysis of existing components and architecture of Software-Defined Net... more This paper is devoted to analysis of existing components and architecture of Software-Defined Networks. The main features of SDN and components interaction are considered. Based on the results we propose formalisms that define rules coordination and interaction of the main components and controls SDN architecture. The methodology and mathematical tools for formalization and verifying OpenFlow protocol are suggested. This methods can be transparently used to analyze critical requirements and properties prior to system implementation. For analysis and verification of OpenFlow protocol was designed formalism that allows checking out the requirements form different specification versions of OpenFlow protocol.

Восточно Европейский Журнал Передовых Технологий, 2012
Розглянуто застосування нечіткої логіки для апарату Е-мереж при моделюванні функцій якості обслуг... more Розглянуто застосування нечіткої логіки для апарату Е-мереж при моделюванні функцій якості обслуговування в мультисервісних мережах. Сформульовано основні правила роботи керуючих переходів Е-мереж з нечіткістю в їх предикатах та правила визначення предикатів для MX і MY переходів Ключові слова: Е-мережа, нечітка логіка, функція переходу, алгоритм Рассмотрено применение нечеткой логики для аппарата Е-сетей при моделировании функций качества обслуживания в мультисервисных сетях. Сформулированы основные правила работы управляющих переходов Е-сетей с нечеткостью в их предикатах и правила определения предикатов для MX и MY переходов Ключевые слова: Е-сеть, нечеткая логика, функция перехода, алгоритм This paper considers the application of fuzzy logic for the Enets to simulating functions quality of service in multiservice networks. The basic rules for control transitions of E-nets with the fuzziness in their predicates and developed rules for determining the predicates of the MX and MY transitions are formulated
Generalized formalization of recognition algorithm for specialized computer systems is presented ... more Generalized formalization of recognition algorithm for specialized computer systems is presented in this paper. The structure features of image recognition methods, which have to be taken into account when developing classifiers for object recognition in specialized computer systems, are described. The fundamental types of images characteristics-features, which are used in various methods of image recognition, are discussed. Approaches to development of classifiers for recognizing robotization objects, which are implemented on basis of Haar classifiers, are discussed. The issues of using machine learning algorithm of adaptive gain AdaBoost for development of such classifiers are also considered. Utilities have been developed for implementation of classifiers for object recognition in specialized computer systems.
The work is devoted to the study of pattern recognition features of industrial parts in individua... more The work is devoted to the study of pattern recognition features of industrial parts in individual fasteners' forms. The main types of neural network architectures and their features are considered. Neural networks are classified into separate categories for ease of perception and analysis. An approach to recognition of hardware products such as fasteners using neural network, which is implemented in Python using Keras machine learning library, is proposed. The main generators are described: for training data, testing, and validation. Codes fragments of corresponding programs for implementation of the proposed approach to pattern recognition of fasteners are presented.
2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), 2015
This research deals with the most important methods of preserving some of the sources. Water clea... more This research deals with the most important methods of preserving some of the sources. Water cleaning and purification for frequent cleaning of filtration facilities for water treatment plants. Several reagents were analyzed to intensify the washing water purification process. As a coagulant, a complex coagulant was used, for this purpose, a mixture of aqueous solutions of aluminum sulfate and oxychloride introduced into the treated water with an ideal proportion of reagents. Based on the results of the study, a technical scheme for washing water purification was developed, which increases productivity and efficiency in the technological and economic process to clarify and use natural water, in addition to environmental safety measures for water treatment plants.
Uploads
Papers by Amer Abu Jassar