The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter variations, and exterior disturbance with input and output time delays as the generalized state, a scaling finite-time extended state observer (SFTESO) is constructed with a scaling gain for quickly estimating the unmeasured velocity and the generalized disturbances within a finite time. With the aid of the SFTESO, the robust FFTCC with the scaling gain is designed not only for ensuring finite-time convergence and strong robustness against time delays and disturbances but also for improving the speed of the convergence as a main novelty. Based on the Lyapunov theorem, the closed-loop stability of the overall SBW system is proven as a global uniform finite-time. Through examination across three specific scenarios, a comprehensive evaluation is aimed to assess the efficiency of the suggested controller strategy, compared with active disturbance rejection control (ADRC) and scaling ADRC (SADRC) methods across these three distinct driving scenarios. The simulated results have confirmed the merits of the proposed control in terms of a fast-tracking rate, small tracking error, and strong system robustness.
The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.
A progression of Polyaniline (PANI) and Titanium dioxide (TiO2) nanoparticles (NPs) were prepared by an in-situ polymerization strategy within the sight of TiO2 NPs. The subsequent nanocomposites were analyzed using Fourier-transform infrared spectra (FTIR), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), and Energy Dispersive X-Ray Analysis (EDX) taken for the prepared samples. PANI/TiO2 nanocomposites were prepared by various compound materials (with H2SO4 0.3 M and without it, to compare the outcome of it) by the compound oxidation technique using ammonium persulfate (APS) as oxidant within the sight of ultrafine grade powder of TiO2 cooled in an ice bath.
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn this work Polyynes was synthesized by pulse laser ablation of graphite target in ethanol solution. UV-Visible Spectrophotometer, Fourier Transform Infrared Spectroscopy (FTIR) and Transmission electron microscopy (TEM) were used to study the optical absorption, chemical bonding, particle size and the morphology. UV absorption peaks coincide with the electronic transitions corresponding to linear hydrogen – capped polyyne (Cn+1H2), the absorption peaks intensity increased when the polyynes were produced at different laser energies and the formation rats of polyynes increased with the increasing of laser pulse number. The FTIR absorption peak at 2368.4 cm-1, 1640.0 cm-1 and 1276.
... Show MoreIn this work, a CW CO2 laser was used for cutting samples of the fiber-reinforced
plastics (FRP) of three different types of reinforcing material; aramide, glass and carbon.
Cutting process was investigated throughout the variation of some parameters of cutting
process and their effects on cutting quality as well as the effect of an inert gas exist in the
interaction region and finally using a mechanical chopper in order to enhance the cutting
quality. Results obtained explained the possibility to perform laser cutting with high
quality in these materials by good control of the parameters and conditions of the process.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More