The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter variations, and exterior disturbance with input and output time delays as the generalized state, a scaling finite-time extended state observer (SFTESO) is constructed with a scaling gain for quickly estimating the unmeasured velocity and the generalized disturbances within a finite time. With the aid of the SFTESO, the robust FFTCC with the scaling gain is designed not only for ensuring finite-time convergence and strong robustness against time delays and disturbances but also for improving the speed of the convergence as a main novelty. Based on the Lyapunov theorem, the closed-loop stability of the overall SBW system is proven as a global uniform finite-time. Through examination across three specific scenarios, a comprehensive evaluation is aimed to assess the efficiency of the suggested controller strategy, compared with active disturbance rejection control (ADRC) and scaling ADRC (SADRC) methods across these three distinct driving scenarios. The simulated results have confirmed the merits of the proposed control in terms of a fast-tracking rate, small tracking error, and strong system robustness.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe traffic congestion caused by the increase in the number of vehicles in the cities as a result of the increase in the population and the density of construction requires the provision of appropriate infrastructure and the provision of transport systems and logistics services that meet the needs of the population to meet the many challenges now and in the future by introducing various modes of transport , In accordance with integrated plans such as the use of (pedestrian friendly environments, bicycles and their own paths, light rail, metro, express bus, as well as public transport buses and others), through the development of Projects High-level roads, such as the annual and major roads, etc., and integrated with the urban planning of
... Show MoreHigh performance work systems and general industrial enterprise performance
This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
We describe curved-mirror Fabry-Perot cavities with embedded silicon nitride membranes, fabricated using a monolithic surface-micromachining process. The presence of the suspended membranes was confirmed by confocal microscopy, and their properties were verified through optical studies and thermomechanical calibration of mechanical/vibrational noise spectra measured at room temperature and atmospheric pressure. The cavities exhibit reflectance-limited finesse (
This study conducted an analytical investigation on the behavior of concrete beams with openings reinforced by glass-fiber-reinforced polymer (GFRP) bars. In this study, five proposed beams reinforced by GFRP bars as flexural and shear reinforcement with openings were numerically examined. The variables were the opening orientation (vertical and horizontal) and the number of openings. These openings were located within the flexural zone of the proposed beams. The result shows that the vertical openings had a significant effect over the horizontal openings on reducing the ultimate load and increasing the mid-span deflection compared with the control beam. Moreover, the results showed t
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More