Preferred Language
Articles
/
alkej-155
Tuning PID Controller by Neural Network for Robot Manipulator Trajectory Tracking
...Show More Authors

Ziegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventional PID controller in the robot manipulator is replaced by NN self tuning PID controller so as to achieve trajectory tracking with minimum steady-state error and improving the dynamic behavior (overshoot). The simulation results showed that the proposed controller has strong self-adaptability over the conventional PID controller.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 14 2015
Journal Name
International Journal Of Computer Applications
Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
...Show More Authors

Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 11 2017
Journal Name
The First Mohesr And Hced Iraqi Scholars Conference In Australasia
Creep Strain Development of Self-compacting Portland-Limestone Cement Concrete
...Show More Authors

Prediction of the structural response of reinforced concrete to the time-dependent, creep and shrinkage, volume changes is complex. Creep is usually determined by measuring the change, with time, in the strain of specimens subjected to a constant stress and stored under appropriate conditions. This paper brings into view the development of creep strain for four self-compacting concrete mixes: A40, AL40, B60 and BL60 (where 40 and 60 represent the compressive strength level at 28 days and L indicates to Portlandlimestone cement). Specimens were put under sustained load and exposed to controlled conditions in a creep chamber (ASTM C512). The test results showed that normal strength Portland-limestone mixes have yielded lower ultimate c

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Numbness of the Mind Paradigm in Haruki Murakami’s After the Quake and Iraq’s After the Quake
...Show More Authors

Haruki Murakami (1949-present) is a contemporary Japanese writer whose works have been translated into fifty languages and won him plenty of Japanese and international awards. His short stories are well constructed in a weird realistic manner and are mixed with elements of surrealism. His novels and short stories fall under the genre of magical realism. One of the major revolving themes that Murakami wrote about was the haunting feeling of emptiness and disconnectedness in a world which seems to care much for materialism and self-interests.

    The paper explores two of Murakami’s short stories in his book After the Quake (2000) and the relevance of their themes and characters to Iraq after the q

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
مجلة البحوث التربوية والنفسية
أنماط الشخصية الأنيكرام مركز المشاعر والذات الأكاديمية لدى الطلبة التميزين
...Show More Authors

Abstract The current study aims to 1) identify the prevalent Enneagram personality types and the academic self among the sixth-grade students of the distinguished secondary schools; 2) the differences of relationship between the Enneagram personality types and the academic self-concept based on gender; 3) identify the correlation between the Enneagram personality types and the academic self-concept; and 4) identify the contribution of each type of personality types to the academic self-concept. To this end, two instrument were used to collect the data: Riso-Hudson’s scale,1995 was administered to measure enneagram types which had translated to the Arabic language by ( al-yassery,2004), the other instrument was constructed by the author de

... Show More
View Publication
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
Autoimmunity and the Terroristic Schemes in Dan Brown's The Da Vinci Code
...Show More Authors

From a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Emotional Intelligence on Employee Performance in Saudi Arabia Banking Sector
...Show More Authors

Saudi Arabia’s banking sector plays an important role in the country’s development as it is among the leading sectors in the financial sector. Considering, two main Saudi banks (The National Commercial Bank and Saudi American bank), the present study aims to observe the impact of emotional intelligence on employee performance. The components of emotional intelligence affecting employee performance include self-management, relationship management, self-awareness, and social awareness. A quantitative methodology was applied to analyse the survey results of 300 respondents over the period from 2018 to 2019. The results show that there was a significant positive impact of self-management, self-awareness, and relationship manageme

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref