In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
The main problem of this research titled (the prevailing scientific values in children's programs provided by the channel (mbc3) is the disclosure of the scientific values that are included in the children's program in the mbc3 channel) which are directed to an important group of society, which is the category of children who spend long hours in front of TV screens to watch these programs, and therefore they acquire many values that can replace fixed values, such as social, moral, religious, etc., and the content analysis method has been used to analyze children's programs presented by mbc3 channel), and the research has reached a number of The results can be summarized b To come: |
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreThe condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show More Aluminum alloys widely use in production of the automobile and the aerospace because
they have low density, attractive mechanical properties with respect to their weight, better
corrosion and wear resistance, low thermal coefficient of expansion comparison with traditional
metals and alloys. Recently, researchers have shifted from single material to composite materials
to reduce weight and cost, improve quality, and high performance in structural materials.
Friction stir processing (FSP) has been successfully researched for manufacturing of metal
matrix composites (MMCs) and functional graded materials (FGMs), find out new possibilities
to chemically change the surfaces. It is shown th
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More