Preferred Language
Articles
/
0BaRR4cBVTCNdQwC_0Cj
FAT-based adaptive backstepping control of an electromechanical system with an unknown input coefficient
...Show More Authors

This paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used as a strong approximator for estimation of uncertainty. The designed control law includes three terms: a feedforward term, a feedback term and a robust term for compensation of modeling error. Lyapunov stability is used to prove the validity of the proposed controller and to derive the update laws for the weighting vectors of orthogonal Chebyshev approximators. A case study of a geared DC motor in connection with a rotating output load is simulated to prove the effectiveness of the proposed controller structure.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jun 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Impairment of Salivary Gland Function in Rheumatoid Arthritis: Association with Change in Salivary Biomarkers and Disease Activity
...Show More Authors

Background: Rheumatoid arthritis is a chronic inflammatory autoimmune disease characterized by joint inflammation, involvement of exocrine salivary and lacrimal glands may occur as extra-articular mani¬festations in this disease. This study aimed to provide evidence of altered in function and composition of salivary gland in patients with rheumatoid arthritis by determine salivary flow rate and some biochemical parameters(total protein, amylase, peroxidase) and to investigate the relationship between disease activity and changes in function and composition of salivary gland. Materials and Methods: Fifty five patients with RA (7 males and 48 females) were enrolled in this study with age range (20-69) years. The patients were separated int

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
An Evaluation of the Activity of Prepared Zinc Nanoparticles with Extracted Alfalfa Plant in the Treatment of Heavy Metals
...Show More Authors

The alfalfa plant, after harvesting, was washed, dried, and grinded to get fine powder used in water treatment. We used the alfalfa plant with ethanol to make the alcoholic extract characterized by using (GC-Mass, FTIR, and UV) spectroscopy to determine active compounds. Alcoholic extract was used to prepare zinc nanoparticles. We characterized Zinc nanoparticles using (FTIR, UV, SEM, EDX Zeta potential, XRD, AFM). Zinc nanoparticle with Alfalfa extract and alfalfa powder were used in the treatment of water polluted with inorganic elements such as Cr, Mn, Fe, Cu, Cd, Ag by (Batch processing). The batch process with using alfalfa powder gets treated with Pb (51.45%), which is the highest percentage of treatment. Mn (13.18%), which is the

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Aeroelastic Flutter of Subsonic Aircraft Wing Section with Control Surface
...Show More Authors

Aeroelastic flutter in aircraft mechanisms is unavoidable, essentially in the wing and control surface. In this work a three degree-of-freedom aeroelastic wing section with trailing edge flap is modeled numerically and theoretically. FLUENT code based on the steady finite volume is used for the prediction of the steady aerodynamic characteristics (lift, drag, pitching moment, velocity, and pressure distribution) as well as the Duhamel formulation is used to model the aerodynamic loads theoretically. The system response (pitch, flap pitch and plunge) was determined by integration the governing equations using MATLAB with a standard Runge–Kutta algorithm in conjunction with Henon’s method. The results are compared with

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref