Abstract:In this paper, some probability characteristics functions (moments, variances,convariance, and spectral density functions) are found depending upon the smallestvariance of the solution of some stochastic Fredholm integral equation contains as aknown function, the sine wave function
The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe current research seeks to achieve several objectives, including knowing the extent of the audit directorate of the Ministry of Construction, Housing and General Municipalities of the International Standard (ISO19011:2018) regarding determining the efficiency and evaluation of auditors and diagnosing the gap between requirements and application and knowing the reasons for not applying some of the items in the standard, starting from the problem, The field raised the following question (Does the audit directorate determine the efficiency and evaluation of auditors according to the standard ISO19011:2018?), and the importance of research lies in determining the return that can be achieved by the directorate through its application of stand
... Show MoreIn our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .
Drawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreAt a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.
Verbal Antonyms: A research in the relationship in meaning Between the words in Arabic language