The blade pitch angle (BPA) controller is key factor to improve the power generation of wind turbine (WT). Due to the aerodynamic structural behavior of the rotor blades, wind turbine system performance is influenced by pitch angle and environmental conditions such as wind speed, which fluctuate throughout the day. Therefore, to overcome the pitch angle control (PAC) problem, high wind speed conditions, and due to type-1 and type-2 fuzzy logic limitations for handling high levels of uncertainty, the newly proposed optimal hybrid type-3 fuzzy logic controller has been applied and compared since type-3 fuzzy controllers utilize three-dimensional membership functions, unlike type-2 and type-1 fuzzy logic controllers. In this paper six different controllers are applied and compared for BPA in WT: type-1 fuzzy logic controller (T1-FLC), interval type-2 fuzzy logic controller (IT2-FLC), interval type-3 fuzzy logic controller (IT3-FLC), optimal hybrid type-1 fuzzy-PID controller (HT1-FPIDC), optimal hybrid type-2 fuzzy-PID controller (HT2-FPIDC), and optimal hybrid type-3 fuzzy-PID controller (HT3-FPIDC). The comparison between Mamdani and Sugeno fuzzy inference systems (FIS) has been applied to find the best inference system. Genetic Algorithm (GA) and Particle swarm optimization (PSO) are used to find the optimal tuning of PID parameters. The results of the 500-kw horizontal axis wind turbine show that Sugeno FIS has higher stability in output power generation than Mamdani FIS. Also, optimal HT3-FPIDC based on Mamdani FIS with PSO provides 19.74 % lower absolute summation error (ASE) than Sugeno FIS in optimal HT2-FLC with PSO and 39.03 % lower ASE than optimal HT1-FLC based on Sugeno FIS with PSO. Finally, the proposed optimal HT3-FPIDC based on PSO and Mamdani FIS provides the optimal results in terms of consistent output power generation at rated value.
Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreBackground: The new concepts and technologies continue to change the dynamics of endodontic practices in the world. Rapid and significant changes in techniques, instrument design, and the type of metals used to manufacture endodontic instruments which have been made during the last few years in an attempt to overcome canal preparation errors. The purpose of this study is to measure and compare canal transportation and centering ability of Self Adjusting File with two rotary nickel-titanium (Ni-Ti) systems, ProTaper and BioRaCe at different levels. Material and Methods: Forty five distal roots of mandibular first molars with moderate curvature were selected using Schneider method. Roots were divided randomly into 3 groups of 15 each and were
... Show MoreThe research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.
The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the
A total number of 33 isolates of Pseudomoans aeruginosa were collected from different clinical samples, such as: burn, wound and urine from patients attending Al-Yarmouk teaching hospital and some private clinical laboratories in Baghdad city through the period from October to December 2016. On the other hand, 21 isolates of P. aeruginosa were collected from 38 different food samples; such as: vegetables and fruits, from different local markets in Baghdad city during the period from November to December 2016. All isolates were identified by using different bacteriological and biochemical assays and confirmed by Vitek-2 identification system. The antimicrobial susceptibility test for clinical and food isolates towards 17 antimicrobial a
... Show MoreAbstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con
... Show MoreBackground : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreSports management is a fundamental pillar that supports sports institutions and plays a pivotal role in achieving advanced levels of success in talent development. The Talent Development Project is one of the key strategic initiatives of the Ministry of Youth and Sports. This study compares department heads with effective managerial competence to those with ineffective competence to highlight differences in performance quality. Through this comparison, the urgent need to assess the administrative performance skills of the heads of sports talent departments becomes evident, particularly their ability to lead and manage the Sports Talent Development Project. The objective is to identify strengths and weaknesses, establish a clear framework fo
... Show MoreObjectives: This study aimed to evaluate and compare the effect of plasma treatment versus conventional treatment on the micro shear bond strength (μSBS), surface roughness, and wettability of three different CAD/CAM materials. Materials and methods: Sixty cylindrical specimens (5 mm diameter ×3 mm height) were prepared from three different CAD/CAM materials: Group A: Zirconia, Group B: Lithium disilicate, and Group C: Resin nano-ceramic. Each group was subdivided into two subgroups according to surface treatment used: Subgroup I: Conventional treatment, zirconia was sandblasted with Al2O3, while lithium disilicate and resin nano-ceramic were etched with hydrofluoric acid. Subgroup II: Plasma treatment, the surface of each material was tr
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More