Semiparametric methods combined parametric methods and nonparametric methods ,it is important in most of studies which take in it's nature more progress in the procedure of accurate statistical analysis which aim getting estimators efficient, the partial linear regression model is considered the most popular type of semiparametric models, which consisted of parametric component and nonparametric component in order to estimate the parametric component that have certain properties depend on the assumptions concerning the parametric component, where the absence of assumptions, parametric component will have several problems for example multicollinearity means (explanatory variables are interrelated to each other) , To treat this problem we use a difference based through the use of biased estimators, in order to get less biased and variance estimators therefor we used difference based estimator liu and difference based almost unbiased liu estiomator. throughout studying simulation based upon mean square error, we concluded that difference based almost unbiased liu estiomator is better than difference based estimator liu since it has the smallest mean square error after that we estimate nonparametric component so removing parametric component and estimated Nonparametric using k-nearest neighbor smoother.
To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res
... Show MoreIn this study, nano TiO2 was prepared with titanium isopropoxide (TTIP) as a resource to titanium oxide. The catalyst was synthesized using phosphotungstic acid (PTA) and, stearyl trimethyl ammonium bromide (STAB) was used as the structure-directing material. Characterization of the product was done by the X-ray diffraction (XRD), X-ray fluorescent spectroscopy (XRF), nitrogen adsorption/desorption measurements, Atomic Force Microscope (AFM) and Fourier transform infrared (FTIR) spectra, were used to characterize the calcined TiO2 nanoparticles by STAB and PWA. The TiO2 nanomaterials were prepared in three crystalline forms (amorphous, anatase, anatase-rutile). The results showed that the
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreThe rubber ropes exercises affected muscle groups, which in turn affects the corners of the conditions of the body before and over the barrier where affected the time passed. To change the angle of the approaching and payment impact on passing each times the barrier 1-5. That passed over the barrier 1and gate 5 impacts on the nature of the achievement, where time has become less. Find the values of cruise missiles and other phases and stages of pitch angle other categories which it enshrines stood as compelling rejection men's 110m hurdles. Find the value of the instant messaging distances between different barriers and stages. Studies by adding rubber sling barriers race categories, measurement of kinematic variables. Emphasis on the devel
... Show More???? ?? ??? ????? ???? ?????? ?????????? ????? ??????? ???? ?????? ????? ??? ??? ????? ?? ???? ??? ????? ????? ???? ????? ????? ?? 0-3cm, 10cm, 20cm, 30cm, 40cm ???????? ????? ?? ???? ????? ???????? ?? ???? ????? ?????? CR-39??????? ?? ??? ??? ?????????? ???????????? ???????? ???? n.cm-2.s-1 5 x 103?? ?????? ?????????? Am241- Be??? ???? ??????? ????????? ??? ?? ???? ????? ?????????? ??? ?? ????? ??????? ?????? 0.881±0.086??? ?? ??????? ????? ??? ????? ??? ?? ????? ????? ??? ???????? ???0.441±0.036 ??? ?? ???????