The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slung load.
Abstract Background: Dne of the key component of nasal tipplasty is effecter control of naral tip projection. Several cartilage grafts have been decreased for this purpose each had its own advantage and disadvantage. Aim: To evaluate using of double teostrut graft for controlling of tip projection. Patients and Methods: A total number of 170 patients were subjected to primary and secondary rhino plaster between January 2020 to January 2023. Those patients had double Teostrut banner graft for support of their nasal tip and maintaining tip projection after operation. Results: The follow period was ranging between 6-12 months. The shape of the nose was evaluating by patents vernal analogues scale. The average score for patients satisfaction wa
... Show MoreEthanolic extracts of Thyme (Thymbra spicata) were tested for their inhibitory action on Paenibacillus larvae the causative agent of American foul brood with different concentration by using disc assay and mixed with culture media . Results showd that 3000mg / disc and 3000 mg / ml was the effective concentroation for the both methods .Thymol was isolated by using TLC technique . The effective concentration of thymol on growth of bacteria was 1000 mg / disc . Thymol and crude extracts of thyme 3000 mg / ml were tested on infected hives by mixed with sugar solution . The symptoms of AFB disease was full disappearance within 21 , 27 days after treatment with thymol and thyme
... Show MoreThe study aims at finding out:
1. The students' attitude towards the mixed learning at the university.
2. The statistically significant differences in attitude towards the mixed learning at the university according to the specialization variable.
3. The statistically significant differences in attitude towards the mixed learning at the university according to the gender variable.
The researcher has constructed a scale for measuring the students' attitude towards the mixed learning at the university.
After assuring its validity and reliability, the scale has been given to a sample of (100) students. The sample is selected randomly from (4) colleges of the university of Baghdad, (2) for scientific specialization and (2)for h
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show More