In this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and FPD-ID controllers.
Shapes have differed in terms of their temporality, tools, technical variations, aesthetic functions and dimensions. The beginnings started with manual primitive techniques that have played an a significant artistic role in the ancient civilizations, then developed with the technological development and the digital technologies that encompassed various programs and specialist means in the graphic design, so that its visual outputs in the textbook that is considered a communication means that has an effect and attracts the recipient. That is what made the researcher search and investigate this topic describing the research problem as follows: What are the shapes as alternatives to the words in the design of the textbook? The research obje
... Show MoreAbstract
Objectives: this study aims to: (1). Assess self-esteem level and academic achievement for students of nursing colleges in southern Iraq. (2). Determine the relationship between levels of self-esteem and academic achievement of the student in the first semester. (3). Identify differences of self-esteem with gender and different age groups.
Methodology: a sample of (426 students) was purposively selected then collected by using a questionnaire which consisted of: I- Sociodemographic characteristics for assessing some important aspects of students, II- Rosenberg's Self-Esteem Scale (RSES) III- Iraq Grading Scale for assessing student achievement. Finally statistical analysis (SPSS) for data processing.
Results: study resu
Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical
In this paper, we deal with a dynamical system that can demonstrate a chaotic attractor of Rossleroscillator. We simulate the Rosslerequations numerically then we investigate the model experimentally. Numerically, the Rossler parameter a and b were fixed and c was changed.The evolution of the system exhibits period, period-doubling, second period doubling, and chaos when control parameters are changed. This evolution can be seen by analyze the time series, the bifurcation diagrams and phase space. Experimentally, the evolution of the system exhibited the same numerical behavior by changing the resistance (Rv) in Rossler circuit that represent as control parameter.
The reticuloendothelial system (RES) play an important role in immunity against bacterial infection and Klebsiella pneumoniae one of the most common causes of hospital-acquired infections. Dextran70 (D70), a polysaccharide, may alter functions of this system through changing many biological activities in the tissues.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g
... Show MoreIn this paper, an experimental analysis of conventional air-cooled and microchannel condensers in automotive vapor compression refrigeration cycle concerning heat transfer coefficient and energy using R134a as a refrigerant was presented. The performance of two condensers and cycles tested regarding ambient temperature which it was varied from 40oC to 65oC, while the indoor temperature and load have been set to be 23oC and 2200 W respectively. Results showed that the microchannel condenser has 224 % and 77 % higher refrigerant side and air side heat transfer coefficient respectively than the coefficients of the conventional condenser. Thus, the COP, in case of using the microchannel
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show More