This paper is focused on orthogonal function approximation technique FAT-based adaptive backstepping control of a geared DC motor coupled with a rotational mechanical component. It is assumed that all parameters of the actuator are unknown including the torque-current constant (i.e., unknown input coefficient) and hence a control system with three motor control modes is proposed: 1) motor torque control mode, 2) motor current control mode, and 3) motor voltage control mode. The proposed control algorithm is a powerful tool to control a dynamic system with an unknown input coefficient. Each uncertain parameter/term is represented by a linear combination of weighting and orthogonal basis function vectors. Chebyshev polynomial is used
... Show MoreIn this work, two different structures are proposed which is fuzzy real normed space (FRNS) and fuzzy real Pre-Hilbert space (FRPHS). The basic concept of fuzzy norm on a real linear space is first presented to construct space, which is a FRNS with some modification of the definition introduced by G. Rano and T. Bag. The structure of fuzzy real Pre-Hilbert space (FRPHS) is then presented which is based on the structure of FRNS. Then, some of the properties and related concepts for the suggested space FRN such as -neighborhood, closure of the set named , the necessary condition for separable, fuzzy linear manifold (FLM) are discussed. The definition for a fuzzy seminorm on is also introduced with the prove that a fuzzy seminorm on
... Show MoreIn this study, the effect of design parameters such as pipe diameter, pipe wall thickness, pipe material and the effect of fluid velocity on the natural frequency of fluid-structure interaction in straight pipe conveying fully developed turbulent flow were investigate numerically,analytically and experimentally. Also the effect of support conditions, simply-simply and clamped-clamped was investigated. Experimentally, pipe vibrations were characterized by accelerometer mounted on the pipe wall. The natural frequencies of vibration were analyzed by using Fast Fourier Transformer (FFT). Five test sections of two different pipe diameters of 76.2
mm and 50.8 mm with two pipe thicknesses of 3.7 mm and 2.4 mm and two pipe materials,stainles
This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More