Muhammad Zohaib

Learn More
Obstacle avoidance is an important task in the field of robotics, since the goal of autonomous robot is to reach the destination without collision. Several algorithms have been proposed for obstacle avoidance, having drawbacks and benefits. In this survey paper, we mainly discussed different algorithms for robot navigation with obstacle avoidance. We also(More)
This research proposed an intelligent obstacle avoidance algorithm to navigate an autonomous mobile robot. The presented Intelligent Bug Algorithm (IBA) over performs and reaches the goal in relatively less time as compared to existing Bug algorithms. The improved algorithm offers a goal oriented strategy by following smooth and short trajectory. This has(More)
This paper proposes a novel obstacle avoidance algorithm for autonomous mobile robot control. The proposed approach brings a solution to the problem of robot traversal in critical shaped environments and offers several advantages compared to the reported approaches. The algorithmic approach, named as, Intelligent Follow the Gap Method (IFGM) is based on(More)
This study focuses on the possible use of Aspergillus fumigatus to remove acid violet 49 dye (AV49) from aqueous solution. In batch biosorption experiments, the highest biosorption efficiency was achieved at pH 3.0, with biosorbent dosage of 3.0 gL−1 within about 30 min at 40 °C. The Langmuir and Freundlich models were able to describe the biosorption(More)
This paper presents kinematic model of two configurations of a wheeled mobile robot. Two-wheeled robot with castor and four-wheeled robot are considered for modeling. Kinematic equations, modeled in MATLAB/Simulink, represent the position and angle of the mobile robots. Simulation results illustrate the actual trajectory followed by the `soft' robot. The(More)
The paper presents Radio Frequency Identification (RFID) based solution for inventory management reported by the researchers in various case studies of warehouses. Limitations and challenges faced by companies in monitoring and managing inventory are highlighted. To cope with the associated complexities, a centralized architecture with four different(More)
Tor basically is designed as an overlay network for the Internet and its low latency anonymity environment is defending tens of thousands of users and protecting their privacy every day. The design had some deficiency on special nodes known as entry guards, the criteria needed to step in the anonymity network. This paper presents the effects of a number of(More)
  • 1