Preferred Language
Articles
/
alkej-236
Integral Sliding Mode Control Design for Electronic Throttle Valve System
...Show More Authors

Abstract

 One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.

In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first instant, the electronic throttle valve dynamics is represented by the nominal system model, this model is not affected by system parameters uncertainty and the non-smooth nonlinearities. This is a consequence of applying the integral sliding mode control. The ISMC consists of two part; the first is the nominal control which is used to control the nominal system, while the second is a discontinuous part which is used to eliminate the effects of the parameters uncertainty and the non-smooth nonlinearities from system model. These features for the ISMC are proved mathematically and demonstrated numerically via seven numerical simulations and for different desired trajectories.  The simulation results clarify that for different system parameters, the ETV behaves as a nominal system. This enables to freely and precisely select the system response characteristics and the time required for the throttle angle to reach the desired value. Moreover the ability to deal with the chattering problem is demonstrated through the worked  simulation tests, where the chattering is eliminated via approximating the signum function by arc tan function.

 Keywords: Electronic throttle valve, Nonlinear spring model, Integral sliding mode control, Non-smooth model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 13 2018
Journal Name
Arab Science Heritage Journal
استيلاء (هنري تيودور) Henry Tudor واستيلاءه على السلطة في انكلترا عام1485
...Show More Authors

Some great families in England had competed for the sake of getting authority and power in England.

This competition turned to be a bloody civil war which extended till 1455 and ended with the victory of Henry Tudor whose judgment in England started from 28th of August 1458, consequently a new dynast which is known as (the Tudor)has established

View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Exploring the Challenges of Diagnosing Thyroid Disease with Imbalanced Data and Machine Learning: A Systematic Literature Review
...Show More Authors

Thyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (10)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Contemporary trends for the treatment of the prisoner in the light of the minimum rules for the treatment of prisoners
...Show More Authors

The issue of the prisoners' rights and the way of dealing with them is not just a minor or
primary issue according to the contemporary attitudes to deal with criminals, but it is a fatal
issue that goes with the development of life and comprehension of human rights. As the
criminal is considered as a human-being who can be reformed and qualified, according to the
aims of the contemporary social service the prisoner is regarded as an idle human source who
can be reformed, treated and qualified so as to make him participate to improve his family and
society in the end.
This study aims at reconstructing the prisons bases when applying the laws of the lowest
level of treatment through the research of oppositions, atti

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 20 2026
Journal Name
Modern Sport
Determining standard levels to test the strength endurance characteristic of speed for basketball players for juniors aged under (16) years
...Show More Authors

View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting the Crowdsourcing in Activation Strategic Foresight for Leaderships Towards Managerial Reforming Strategies Selection A Suggested Study for Managerial Leadership
...Show More Authors

Abstract                                                                                                            

Environmental data (whether pre-emptive or responsive perspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
USE OF IMMOBILIZED L-ARABINOSE ISOMERASE FOR PRODDUCTION OF TAGATOSE: USE OF IMMOBILIZED L-ARABINOSE ISOMERASE FOR PRODDUCTION OF TAGATOSE
...Show More Authors

L-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 d

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Voluntary Work for Women in the Light of Islamic Education: Voluntary Work for Women in the Light of Islamic Education
...Show More Authors

 

The research aims to identify the most important areas of voluntary work available to women in society, stand on the most important controls that push women to work in voluntary areas in society. The research also seeks to stand on the most prominent obstacles to the voluntary work of women in society. The research contained four main chapters: Chapter I: Definition of research, Chapter 2: Objectives, areas, controls and effects of volunteer work, Chapter 3: Voluntary Work of Women in the Celestial Religions, and lastly, Chapter 4: Theories, Constraints, and Recommendations for Voluntary Work for Women.The researcher suggested several recommendations: 1-establishing a unit responsible for planning,

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Crossref