Preferred Language
Articles
/
1RaSR4cBVTCNdQwC9UAl
On modelling and adaptive control of a linear smart beam model interacting with fluid
...Show More Authors
Abstract<p>This paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized using the Galerkin approach to obtain standard multi-modal equations. An adaptive approximation control structure is proposed to suppress the beam vibration. The controller consists of a proportional-derivative PD control plus an adaptive approximation compensator AAC with guaranteed stability. A simply supported beam with 2 piezo-patches interacting with fluid is simulated. The disturbance hydrodynamic force that excites the beam vibration is assumed as a harmonic force with 50 Hz frequency and 1 N amplitude. The results prove the efficacy of the proposed control architecture.</p>
Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Design a Vegetative Filter Strips Length Using VFSMOD_W Model for Reducing Sediments and Pesticides
...Show More Authors

 Abstract 

The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
meta and its dimensions in the designed bio-formation - virtual reality environment - a model
...Show More Authors

This study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 11 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Three-species food chain model with cannibalism in the second level
...Show More Authors

This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Cox proportion hazard model for patients with hepatitis disease in Iraq
...Show More Authors

Cox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.

View Publication Preview PDF
Crossref
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 22 2019
Journal Name
Journal Of Pharmaceutical Sciences And Research
Evaluation of the efficacy of caries removal using papain gel (Brix 3000) and smart preparation bur (in vivo comparative study)‏
...Show More Authors

Publication Date
Wed Feb 01 2023
Journal Name
Health Science Reports
Diagnostic potential of salivary interleukin‐17, RANKL, and OPG to differentiate between periodontal health and disease and discriminate stable and unstable periodontitis: A case‐control study
...Show More Authors
Abstract<sec><title>Background and Aims

Limitations of the conventional diagnostic techniques urged researchers to seek novel methods to predict, diagnose, and monitor periodontal disease. Use of the biomarkers available in oral fluids could be a revolutionary surrogate for the manual probing/diagnostic radiograph. Several salivary biomarkers have the potential to accurately discriminate periodontal health and disease. This study aimed to determine the diagnostic sensitivity and specificity of salivary interleukin (IL)‐17, receptor activator of nuclear factor‐κB ligand (RANKL), osteoprotegerin (OPG), RANKL/OPG for differentiating (1) periodontal health from disease and (2) stable a

... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Impact of a Proposed Strategy According to Luria’s Model in Realistic Thinking and Achievement in Mathematics
...Show More Authors

The research aims to find the impact of a proposed strategy according to the Luria model on realistic thinking among fifth-class scientific students and their achievement in mathematics. To achieve it, the experimental research method and the quasi-experimental design were used for two equal groups, one of them is a control group taught in traditional way and the other is an experimental one taught according to strategy based on Luria model. The research community represents the students of the fifth scientific class from the General Directorate of Education of Karkh First. The research sample (40) students were deliberately chosen and distributed equally between the two groups after making sure that they were equals in their previo

... Show More
View Publication
Scopus (16)
Scopus Crossref