The physical behavior for the energy distribution function (EDF) of the reactant particles depending upon the gases (fuel) temperature are completely described by a physical model covering the global formulas controlling the EDF profile. Results about the energy distribution for the reactant system indicate a standard EDF, in which it’s arrive a steady state form shape and intern lead to fix the optimum selected temperature.
This study focuses on evaluating the suitability of three interpolation methods in terms of their accuracy at climate data for some provinces of south of Iraq. Two data sets of maximum and minimum temperature in February 2008 from nine meteorological stations located in the south of Iraq using three interpolation methods. ArcGIS is used to produce the spatially distributed temperature data by using IDW, ordinary kriging, and spline. Four statistical methods are applied to analyze the results obtained from three interpolation methods. These methods are RMSE, RMSE as a percentage of the mean, Model efficiency (E) and Bias, which showed that the ordinary krigingis the best for this data from other methods by the results that have b
... Show MoreThis paper describes a microcontroller-based function generator system. By the function generator sine wave, square wave, quasi-square wave, saw-tooth and triangular waveforms are generated over a wide frequency range according to user requirements. By utilizing processing capabilities of the microcontroller the hardware is minimized exceedingly. The output waveform shapes are digitally-controlled to achieve the required wave shape. The single chip microcomputer of waveform generation equipment offers the possibility of improvements in manufacture reliability, maintenance and servicing and increased control flexibility. The system is built and tested. The results of test were satisfactory and appreciated by test engineers at different ce
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreWeibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.
... Show MoreIn this paper, Bayes estimators of Poisson distribution have been derived by using two loss functions: the squared error loss function and the proposed exponential loss function in this study, based on different priors classified as the two different informative prior distributions represented by erlang and inverse levy prior distributions and non-informative prior for the shape parameter of Poisson distribution. The maximum likelihood estimator (MLE) of the Poisson distribution has also been derived. A simulation study has been fulfilled to compare the accuracy of the Bayes estimates with the corresponding maximum likelihood estimate (MLE) of the Poisson distribution based on the root mean squared error (RMSE) for different cases of the
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
In this paper, Mann-Kendall test was used to investigate the existence of possible deterministic and stochastic climatic trends in (Baghdad,Basrah,Mosul,Al-Qaim) stations. The statistical test was applied to annual monthly mean of temperatures for the period (19932009). The values of S-statistic were (62, 44, 52, 64) by comparing these values with the table of null probability values for S we get a probability of (0.002, 0.026, 0.010, 0.002) this result is less than α for the 95% confidence level (α = 0.05) indicating a significant result at this level of confidence. Concluded that an increasing trend in concentration is present at the 95% confidence level and the variance of the S-statistic is calculated and it is com
... Show MoreThe interactions of drug amoxicillin with maltose or galactose solutions with a variation of temperature have been discussed by taking in the volumetric and viscometric procedures. Physical properties [densities (ρ) and viscosities (η)] of amoxicillin (AMOX) aqueous solutions and aqueous solutions of two type saccharides (maltose and galactose 0.05m) have been measured at T = (298.15, 303.15 and 308.15) K under atmospheric pressure. The apparent molar volume (ϕv cm3mole-1) has been evaluated from density data and fitted to a Redlich-Mayer equation. The empirical parameters of the Mayer-Redlich equation and apparent molar volume at infinite dilution ذv were explicated in terms of interactions from type solute-solvent and solute
... Show MoreThis research prepared polymer blend contains from epoxy resin (Ep) and polyurethane
)Pu) as a matrix material of percentage (90 %) from epoxy and ) 10 (% polyurethane and
reinforced by PVC fibers and aluminum fibers two dimension knitted mat with fractional
volume(15 %), and study impact strength before and after reinforcing at temperatures of
(20,40,60(
o
CØŒand the results have shown that the reinforcing matrix materials by fibers
increased impact strength values that rise from(3.387kJ/m2) to (151.62kJ/m2) of composite
material (Ep+Pu+PVC(and thus ) Ep+Pu+PVC+Al.F) at last (Ep+Pu+Al.F (. following
composite material so that temperatures increase led to rise impact strength values except the
polymer