This paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Bone density is a major factor that affect mini implant primarily stability; no Iraqi studies have evaluated bone density related to mini-implant placement for orthodontic anchorage at age 13 -15 years. The present research aims to evaluate gender, side and site differences in the bone density at various orthodontic implant sites for the maxillary alveolar bone. Materials and methods: Twenty nine individuals (16 males and 13 females) had subjected to clinical examination, then 64-multislice computed tomography scan data were evaluated and bone density was measured in Hounsfield unit at 21 points (9 points for each side and 3 points between the right and left central incisors) . Results: The results obtained showed that there ar
... Show MoreThis survey investigates the thermal evaporation of Ag2Se on glass substrates at various thermal annealing temperatures (300, 348, 398, and 448) °K. To ascertain the effect of annealing temperature on the structural, surface morphology, and optical properties of Ag2Se films, investigations and research were carried out. The crystal structure of the film was described by Xray diffraction and other methods.The physical structure and characteristics of the Ag2Se thin films were examined using X-ray and atomic force microscopy (AFM) based techniques. The Ag2Se films surface morphology was examined by AFM techniques; the investigation gave average diameter, surface roughness, and grain size mutation values with increasing annealing temperature
... Show MoreThe reason for my choice of the topic (what Imam Al-Tirmidhi mentioned in his book Al-Sunan regarding the provisions of sales) is that he mentioned many topics that affect people's lives, which are represented by commercial transactions and the exchange of benefits between them, so it became clear to them what is forbidden and what is not, aiming not to fall into the prohibited, and to achieve their interests, and relieve them of embarrassment. What we will see in the research.