This paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
The research aim at identifying the time of motor response to auditory and visual stimuli as well as identifying the accuracy of blocking and finding the relationship between motor repose time and blocking accuracy. The community was (7) primer soccer league of 2019 – 2020 and the subjects were (24) volleyball players from Al Jaish and Al Shorta clubs ten players from Al Shorta club performed the pilot study. The researchers used the descriptive method and the data was collected and treated using SPSS. The results showed a significant relationship between response time and blocking accuracy. The researchers recommended concentrating on applying scientific principles for developing time of motor response in a manner suitable for bl
... Show MoreLow-level microbial activity due to the production of organic acids is a recognized problem during the initial phase of food waste composting. Increasing such activity levels by adjusting the pH values during the initial composting phase is the primary objective to be investigated. In this study, sodium acetate (NaoAc) was introduced as an amendment to an in-vessel composting system. NaoAc was added when the pH of the compost mixture reached a low level (pH < 5), the addition increased pH to 5.8. This had a positive effect on the degradation of organic materials i.e. the formation of methane gas compared to the results without NaoAc addition.
The results also proved that anaerobic-aerobic in-vessel composting could reduce the
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreIn the last few years, following the relative stability of the political, economic, and security environments, Iraq has embarked on a transformation towards an ambitious program of automation across various sectors. However, this automation program faces numerous challenges, including significant investments in technology and training, addressing social impacts, and combating widespread illiteracy
Abstract: A home-made dc sputtering is characterized by cathode potential of 250-2500 V and sputtering gas pressures of (3.5×10-2 – 1.5) mbar. This paper studies in experiment the breakdown of argon, nitrogen, and oxygen in a uniform dc electric field at different discharge gaps and cathode potentials. Paschen curves for Argon, Nitrogen, and oxygen are obtained by measuring the breakdown voltage of gas within a stainless steel vacuum chamber with two planar, stainless steel electrodes. The Paschen curves in Ar, N2, and O2 gases show that the breakdown voltage between two electrodes is a function of pd (The product of the pressure inside the chamber and distance between the electrodes). Current-voltage characteristics visualization of the
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreGeographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,
... Show More