Abstract. In this paper, a high order extended state observer (HOESO) based a sliding mode control (SMC) is proposed for a flexible joint robot (FJR) system in the presence of time varying external disturbance. A composite controller is integrated the merits of both HOESO and SMC to enhance the tracking performance of FJR system under the time varying and fast lumped disturbance. First, the HOESO estimator is constructed based on only one measured state to precisely estimate unknown system states and lumped disturbance with its high order derivatives in the FJR system. Second, the SMC scheme is designed based on such accurate estimations to govern the nominal FJR system by well compensating the estimation errors in the states and the lumped disturbance. To verify the tracking trajectory performance, several simulations have been conducted on the simulated FJR plant model. In addition, a comparative study is carried out between the proposed method and the full state feedback linearization control (FLC) with first order ESO (ESO1).
In this study, the effect of increasing pump pulse energy and delay time on the energy conversion efficiency of the Potassium Titanyl Phosphate (KTP) crystal at room temperature was investigated. It was found that the higher the pump pulse the greater the efficiency at a certain value of the delay time. Moreover, at the delay time 3.524ns, we found that the efficiency of the conversion of energy increases from 0.0112 to 0.0159. We also observed that the lower delay time between the pump and the probe pulses leads to increase the rate of energy conversion efficiency of the KTP crystal, where the reaches up to 3, which is higher than the value recorded in the absence of a pump pulse. The highest value of the
... Show MoreIn this study, light elements Li ,10B for (a,n) and (n,a) reactions
as well as o-particle energy from threshold energy to 10 MeV are
used according to the available data of reaction cross sections. The
more recent cross sections data of (a,n) and (n,a) reactions are
reproduced in fine steps 42 Kev for 10B(n,o) Li in the specified
energy range, as well as cross section (o,n) Values were derived from
the published data of (n,a) as a function of a-energy in the same fine
energy steps by using the principle inverse reactions. This calculation
involves only the ground state of Li OB in the reactions 'Li(a,n) B
B (n,a) Li
Introduction
When two charged nuclei overcome their Coulomb repulsion, a
rearrangement
Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreModern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreObjective(s): assessment of the health follow up and weight control for women with osteoporosis and find out the relationship between their health follow up and weight control and their socio-demographic characteristics.
Methodology: A descriptive study was conducted on women with osteoporosis for the period of September, 26th 2020 to Jun, 20th 2021. Non- probability (convenient) sample of (70) women with osteoporosis selected from (5) Private Clinics for Joints and Fractures in Baqubah City. A questionnaire was designed though extensive review of literatures and it consists of three parts: the first part includes women’s socio demographic characteristics, the second part inclu
... Show MoreObjectives: to assess nurses' knowledge toward infection control measures for hepatitis a virus in hemodialysis
units and to detemine the relationship between nurses' knowledge and their demographical characteristics.
%eihs:::°mg:rA5th:e;:#tt£:eoscTodbyerw9¥,C22;5];e.d°utathem°dialysisunitsofBaghdadTeachingHospha|sstated
A non-probability `tturposive" sample of (51) nurses, who were working in hemodialysis units were selected
from Baghdad teaching hosphals. The data were collected through the use of constructed questionnaire, which
consists of two parts (I) Demographic data fom that consists of 10 items and (2) Nurses' knowledge form that
consists of 6 sections contain 79 items, by means of direct interview techniq
In this paper, we extend the work of our proplem in uniformly convex Banach spaces using Kirk fixed point theorem. Thus the existence and sufficient conditions for the controllability to general formulation of nonlinear boundary control problems in reflexive Banach spaces are introduced. The results are obtained by using fixed point theorem that deals with nonexpanisive mapping defined on a set has normal structure and strongly continuous semigroup theory. An application is given to illustrate the importance of the results.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More