This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect of enhancing the relative stability of the closed-loop system by eliminating the oscillation in its transient part but at the expense of greater rise time. However, for some applications, long rise time may be an allowable price to get rid of undesired oscillation. To demonstrate the proposed hybrid controller's performance numerically, a new performance index, designated by Integral Reciprocal Time Absolute Error (IRTAE), is defined as a figure to measure the oscillation of the response in its transient part. The proposed controller enhances this performance index by 0.6771%. Although the relative enhancement of the performance index is small, it contributes to eliminating the oscillation of the response in its transient part. Simulation results are performed on the MATLAB/Simulink environment.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More
This study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec
... Show MorePOSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL
Museum education is of great importance to an appropriate representation of museums’ collections and exhibits, including traditional fashion. Therefore, museum educators/curators need to be equipped with the most essential skills in their profession in order to adequately present the museum’s history and holdings. This could be achieved through specialized training programs. However, Arab countries are still behind in terms of museum education. Therefore, this article aims to shed light on this issue by assessing the knowledge and skills possessed by museum educators/curators and how training programs could affect them
The research in the linguistic structures of the historians Al-Yaqoubi is considered a model of the important topics in historical studies in general, given its importance in the lives of peoples due to its connotations and meanings that summarize interpretation, clarification, and prolonged speech, as it includes life meanings with many dimensions, these structures have been used in historical incidents Important, and throughout the different ages, as it can be used to support an opinion, solve problems, prove evidence, increase wisdom, and it needs rich life experiences, and a sound language, to use it, and needs a wide absorptive capacity for the recipient, the research included linguistic structures in the achievement of science , Lingu
... Show MoreBackground: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined
... Show MoreIt is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More