The attribute quality control charts are one of the main useful tools to use in control of quality product in companies. In this paper utilizing the statistical procedures to find the attribute quality control charts for through fuzzified the real data which we got it from Baghdad Soft Drink Company in Iraq, by using triangular membership function to obtain the fuzzy numbers then employing the proposed ranking function to transform to traditional sample. Then, compare between crisp and fuzzy attribute quality control.
Abstract A descriptive (retrospective) (a case-control) study was carried out at Al-Karama Teaching Hospital, Baghdad Teaching Hospital and Surgical Specialties Hospital, and Gastro-Intestinal Tract and Liver (GIT) Hospital for the period of December 1st, 2001 To March 15th 2002. To identify aspects of life-style that may contribute to the occurrence of peptic ulcer (P.U)as risk factors. And to find out the relationship between the demographic characteristic of the group. Non-probability (Purposive) sample of (100) cases who were admitted to the endoscopy department who were later on diagnosed as having
This paper represents an experimental study on the application of smart control represented by the use of the fuzzy logic controller. Two-link flexible manipulators that are used in airspace and military applications are made of flexible materials characterized by low frequency and damping ratio. To solve this problem, this paper proposes the use of smart materials (piezoelectric transducers), where each link is bonded with a pair of piezoelectric transducers that act as a sensor and another as an actuator. As the arm vibrates because of the movement generated by the motor, this voltage is controlled by a regulator inside the LABVIEW® 2020 software and sends the output control voltage to the piezoelectric actuator. Experimental results
... Show MoreA new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli
... Show MoreIn this paper, we study the effect of group homomorphism on the chain of level subgroups of fuzzy groups. We prove a necessary and sufficient conditions under which the chains of level subgroups of homomorphic images of an a arbitrary fuzzy group can be obtained from that of the fuzzy groups . Also, we find the chains of level subgroups of homomorphic images and pre-images of arbitrary fuzzy groups
This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreIn our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreAbstract : A descriptive study was conducted out patient in Neuralgic Hospital and Teaching Baghdad Teaching Hospital from 1st July / 2004 through October 1st / 2004 . in order to assess with QOL for CVA patients , the study aimed to identifying the QOL domain of ( physical , psychological , level of independence , social and environment ) and it relation with some demographic characteristic which is related to those patients .A purposive sample of ( 50 ) CVA patients who selected from out patient clinic of hospitals . A development questionnaire was structured and is adopted of WHO quality of life qu
Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More