Preferred Language
Articles
/
QhdTaJIBVTCNdQwCIa_F
Robust adaptive active disturbance rejection control of an electric furnace using additional continuous sliding mode component
...Show More Authors

The temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated online by a non-linear observer bandwidth, that is as a function of the observation errors. Moreover, with the help of disturbance estimation, a novel sliding manifold is constructed with parameters adaptively adjusted by a dynamic nonlinear bandwidth function to reduce the impact of high gain problems, especially noise-sensitivity. A continuous sliding-mode (CSM) based component is also designed to handle disturbance estimation errors. Third, the stability of the closed loop system, including the proposed controller and estimator, is mathematically proved using the Lyapunov theorem. Finally, the comparative simulation results show that the proposed method has superior robustness and temperature tracking performance.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 31 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing

... Show More
View Publication
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Tikrit Journal Of Pure Science
Optical Mark Recognition using Modify Bi-directional Associative Memory
...Show More Authors

Optical Mark Recognition (OMR) is an important technology for applications that require speedy, high-accuracy processing of a huge volume of hand-filled forms. The aim of this technology is to reduce manual work, human effort, high accuracy in assessment, and minimize time for evaluation answer sheets. This paper proposed OMR by using Modify Bidirectional Associative Memory (MBAM), MBAM has two phases (learning and analysis phases), it will learn on the answer sheets that contain the correct answers by giving its own code that represents the number of correct answers, then detection marks from answer sheets by using analysis phase. This proposal will be able to detect no selection or select more than one choice, in addition, using M

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Tourism Companies Assessment via Social Media Using Sentiment Analysis
...Show More Authors

In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using cleaner production costs to achieve sustainable competitive advantage
...Show More Authors

Abstract

                Target costing and cleaner production are among the most important techniques in the field of cost and management accounting, which, when integrated, enable economic units to achieve the goal of cost management by reducing it by calculating cost more accurately than traditional methods.To achieve this, the researcher relied on the inductive approach in writing the theoretical framework for the research, relying on foreign and Arabic books, dissertations and university theses, foreign and Arabic research and periodicals related to the subject of the research, and relying on the descriptive and analytical approach in

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Urology Annals
Modified snodgrass hypospadias repair using the lembert suturing technique
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2010
Journal Name
Journal Of Al-nahrain University
HIDDEN FEATURES DETECTION USING HISTOGRAM MODIFICATION IN MRI IMAGES
...Show More Authors

Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref