This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Wind turbine (WT) is now a major renewable energy resource used in the modern world. One of the most significant technologies that use the wind speed (WS) to generate electric power is the horizontal-axis wind turbine. In order to enhance the output power over the rated WS, the blade pitch angle (BPA) is controlled and adjusted in WT. This paper proposes and compares three different controllers of BPA for a 500-kw WT. A PID controller (PIDC), a fuzzy logic controller (FLC) based on Mamdani and Sugeno fuzzy inference systems (FIS), and a hybrid fuzzy-PID controller (HFPIDC) have been applied and compared. Furthermore, Genetic Algorithm (GA) and Particle swarm optimization (PSO) have been applied and compared in order to identify the optimal
... Show MoreIn every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show Moreيمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،
... Show MoreBackground: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe process of transporting waste from urban areas to sanitary landfill sites requires large amounts of money due to the length and distance. To address this problem, temporary transfer stations were established by the Municipality of Baghdad to reduce the cost of transportation, and for the purpose of preserving the environment in a sustainable manner, standards were set for the establishment of these stations. The two stations of Al-Karrada Municipality and Al-Shula Municipality were chosen as a case study to measure the extent of adopting and applying the standards for establishing substations locally, regionally and internationally, and the most important results were reached Which is that the transforming (regular) stations of the t
... Show MoreThis study aimed to explore The Degree of Practicing of the Sixth Primary Social Studies’ Teachers in Iraq for the Principles of Active Learning from their Point of view
The study society consisted of 230 male and femalesocial studiesteachers’ subjects for the sixth primary grade in Al-Anbar General Directorate of Education. 160 of them were selected to represent the sample of the study with a percent of (70%) from the original society. To achieve the aims of the study, the researchers prepared a questionnaire consisting of (43) items which represented the active learning principles. The validity and stability of the tool were verified. The researchers used the descriptive approach to suit the objectives of this study. &
... Show More