In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe
... Show MoreChallenges facing the transition of traditional cities to smart: Studying the challenges faced by the transition of a traditional area such as Al-Kadhimiya city center to the smart style
This research discusses the subject of identity in the urban environment as it attempts to answer a number of questions that come with the concept of identity. The first of these questions: What is identity? Can a definition or conceptual framework be developed for identity? What about individual, collective, cultural, ethnic, political and regional identity? Is there a definition of identity in the urban environment in particular? If there is a definition of identity, what about social mobility responsible for social change? How can we see identity through this kinetics? Can we assume that identity in the urban environment has a variable structure or is of variable shape with a more stable structure? Can we determine the spatial-tempora
... Show MoreThe study focused on the results of first paleostress from thrust fault slip data on Tertiary age of Hemrin North Structure, North of Iraq. The stress inversion was performed for fault slip data using an improved right dihedral model, and then followed by rotational optimization (Georient Software). The trend of the principal stress axes (σ1, σ2 and σ3) and the ratio of the principal stress differences (R) show the main paleostress field is NE-SW compression regime. As well as using Lisle graph and Mohr diagram to determine the magnitudes of palestress. The values paleostress of the study area were σ1=1430 bars, σ2=632 bars and σ3=166 bar. The large magnitudes of the primary stress axes could be attributed to active tecto
... Show MoreThis article discusses the peculiarities of the Arabic root, its phonemic structure, and morphological categorization. The pure appearance of the Arabic root in language categorization allows you to separate the onomatopoeic feature of inflectional structure and phonetic rules of the Arabic language by which the root is categorized. This phenomenon of meaningful consonant phonemes in the Arabic roots makes the theory of onomatopoeia practicable not just only in Arabic but also in other Semitic languages. Moreover, the first consonant of an Arabic root usually contains the word's primary, essential meaning, and the second and third lookup. Also, in this work, it is noted that the grammar of the Arabic language has many features aimed
... Show MoreZnS nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM). The particle size is determined by field effect scanning electron microscopy (FESEM), UV-Visible absorption spectroscopy and XRD. UV-Visible absorption spectroscopy analysis shows that the absorption peak of the as-prep
... Show MoreThis study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status? The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a
... Show MoreA steel-concrete composite structure (1) is described. The steel-concrete composite structure comprises a steel member (2) having an upper surface (5) and a plurality of shear connector elements (6) upstanding from the upper surface and a concrete slab (4) having upper and lower surfaces (7, 8). The slab is supported on its lower surface by the upper surface of the steel member. The slab comprises a plurality of through holes (9) between the upper and lower surfaces, each through hole tapering towards the lower surface so as to form an inverted frustally-shaped seating surface (10). The concrete slab is configured and positioned with respect to the steel member such that at least one shear connector element projects into each through hole.
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show More