The temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated online by a non-linear observer bandwidth, that is as a function of the observation errors. Moreover, with the help of disturbance estimation, a novel sliding manifold is constructed with parameters adaptively adjusted by a dynamic nonlinear bandwidth function to reduce the impact of high gain problems, especially noise-sensitivity. A continuous sliding-mode (CSM) based component is also designed to handle disturbance estimation errors. Third, the stability of the closed loop system, including the proposed controller and estimator, is mathematically proved using the Lyapunov theorem. Finally, the comparative simulation results show that the proposed method has superior robustness and temperature tracking performance.
To limit or reduce common microbial contamination occurrence in dairy products in general and in soft cheese in particular, produced in locally plants, this study was performed to demonstrate the possibility of implementing HACCP in one of dairy plants in Baghdad city
HACCP plan was proposed in soft cheese production line. A pre-evaluation was performed in soft cheese line production, HACCP Pre-requisites programs was evaluated from its presence and effectiveness. The evaluation was demonstrated risk in each of: Good Manufacturing Practice (GMP) program, evaluated as microbial and physical risk and considered as critical r
... Show MoreObjective: This study aims to determine the effectiveness of health education oriented program on parents' awareness
towards adolescents' violence control.
Methodology: A quasi-experimental study was carried out in Baghdad city form 1st of April, 2008 to 1st of September,
2009. A purposive "non-probability" sample of 60 parents who have adolescents' violence in their families who were
selected according to specific criteria. The researcher divided the samples into two equal groups; the study and control
groups. The health education program, as well as a questionnaire was constructed as tools for data collection by the
researcher for the purpose of the study. Content validity was determined by a panel of experts in diffe
Dates are considered one of the most important foods consumed in Arab countries. Dates are commonly infested with the sawtoothed grain beetle, Oryzaephilus surinamensis. Consequently, the date yield, quantity, and quality (economic value and seed viability) are negatively affected. This study was designed to investigate the effectiveness of air evacuation as eco-friendly and safe control method against adult O. surinamensis. Insects were obtained from the infested date purchased from a private store in sakaka city, Aljouf region, Saudi Arabia. Air evacuation (using a vacuum pump) and food deprivation were applied to O. surinamensis, and insect mortality was observed daily in comparison with the control group (a
... Show MoreIn this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThe international financial accounting and reporting standards IFRS/IAS represent the set of rules and foundations that the economic entity must follow in the measurement, presentation, and disclosure of the elements of the financial statements, the implementation of adopting the international financial reporting standards contributes to improving the qualitative characteristics of accounting information, so the current research aims to explain the role of adopting the International Accounting Standard (IAS) in improving the qualitative characteristics as well as analyzing the impact of the adoption of IAS.1 in improving the qualitative characteristics of accounting information within the financi
... Show MoreThe study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper