Preferred Language
Articles
/
ZRfVepIBVTCNdQwCA7H7
Hierarchical non-singular terminal sliding mode controller for a single link flexible joint robot manipulator
...Show More Authors

—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on the modeling dynamics, the system is decomposed hierarchically into two-second order subsystems, namely, a rigid body and a flexible subsystem. In the first level, the sliding manifold for each subsystem is designed based on the NTS surfaces. Then, in the second level, the total sliding surface is constructed as the linear combination of NTS surfaces of two subsystems. Thereafter, a HNTSM control is obtained based on Lyapunov theorem to drive both subsystems to their equilibrium points in the finite time. Simulation results demonstrate the effectiveness of proposed scheme (HNTSMC) over (HCSMC).

Scopus Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Constructing a Scale for the Nine Types of Students Personality: Constructing a Scale for the Nine Types of Students Personality
...Show More Authors

Abstract

The current research aims to construct a scale for the nine types of students’ personality according to Rob Fitzel model. To do this, (162) items were formed that present the nine types of personality with (18) items for each type. To test the validity of the scale, a sample of (584) students of Al-Mustansrya University were chosen. The data of their responses was analyzed by using factor analysis. The findings explored (9) factors as one factor for each type of personality with (12) items for each one. Then, the reliability of the scale was found by using the test-retest method and Alfa Cronbach method.

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Alexandria Engineering Journal
Employing Sisko non-Newtonian model to investigate the thermal behavior of blood flow in a stenosis artery: Effects of heat flux, different severities of stenosis, and different radii of the artery
...Show More Authors

View Publication
Scopus (28)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
A Comparative Study of a Moving Bed Biofilm Reactor and Bio-shaft Technology for a Wastewater Treatment Process: A review
...Show More Authors

In addition to the primary treatment, biological treatment is used to reduce inorganic and organic components in the wastewater. The separation of biomass from treated wastewater is usually important to meet the effluent disposal requirements, so the MBBR system has been one of the most important modern technologies that use plastic tankers to transport biomass with wastewater, which works in pure biofilm, at low concentrations of suspended solids. However, biological treatment has been developed using the active sludge mixing process with MBBR. Turbo4bio was established as a sustainable and cost-effective solution for wastewater treatment plants in the early 1990s and ran on minimal sludge, and is easy to maintain. This

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Content Analysis of Social Studies Book at the Secondary School in the Kingdom of Saudi Arabia (Curricula System- Joint Program) in the Light of the Cultural Intelligence Dimensions
...Show More Authors

The study aimed at recognizing the availability of the cultural intelligence dimensions in social studies book at the high school in the kingdom of Saudi Arabia (curricula system- joint program). The study used the descriptive approach and content analysis method. As tools of the study, the study adopted a list of cultural list of indicators and dimensions that suits the secondary stage social curricula. It further adopted a content analysis form designed to analyze the social studies book in the secondary school in the kingdom of Saudi Arabia. The study has reached several results, the most significant results were: There is a difference in including the cultural intelligence dimensions in social studies book at high school in the kingd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Modern Sport
Effect of rehabilitation exercises in improving the motor range of people with partial rupture of the anterior cruciate ligament of the knee joint by ages (30-35) men
...Show More Authors

The study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref