Preferred Language
Articles
/
alkej-315
High Order Sliding Mode Observer-Based Output Feedback Controller Design For Electro-Hydraulic System
...Show More Authors

A perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after canceling the perturbation term.

The numerical simulation results showed excellent performance of the proposed output feedback controller in forcing the piston position to follow the desired reference position. Moreover, the control effort spent was minimal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Comparison of Maximum Likelihood and some Bayes Estimators for Maxwell Distribution based on Non-informative Priors
...Show More Authors

In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Phylogenetic tree analysis based on the 16S sequence alignment for Klebsiella spp. isolated from different sources
...Show More Authors

16S ribosomal RNA (16S rRNA) gene sequences used to study bacterial phylogeny and taxonomy have been by far the most common housekeeping genetic marker utilized for identification and ancestor determination. This study aimed to investigate, for the first time, the relationship between Klebsiella spp. isolated from clinical and environmental samples in Iraq.

     Fifty Klebsiella spp. isolates were isolated from clinical and environmental sources. Twenty-five isolates were collected from a fresh vegetable (Apium graveolens) and 25 from clinical samples (sputum, wound swab, urine). Enteric bacteria were isolated on selective and differential media and identified by an automatic identif

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Two Spectrophotometric Methods Based on Diazotization Coupling Reaction for Determination of Genistein in Pure and Supplement
...Show More Authors

      Genistein (GEN) is one of the predominant dietary isoflavones found in legumes such as soybeans. Genistein has been recommended as an osteoporosis treatment for postmenopausal women and elderly men, with the intention of reducing cardiovascular disease and hormone-dependent malignancies. Therefore, two sensitive and simple methods for quantifying it in the supplements preparation were developed.The first method (A) comprised employing the surfactant Triton X-114 to extract the result of the diazotization reaction with 4-Aminoacetophenone(4AMA) utilizing a cloud point extraction technique. The product was extracted using micelles of a non-ionic surfactant (TritonX-114) and then spectrophotometrically detected at a specified wa

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Flexible handover solution for vehicular ad-hoc networks based on software defined networking and fog computing
...Show More Authors

<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and study the Structural and electrical and mechanical properties of High Temperature Superconductor Tl0.5Pb0.5Ba2Can-1Cun-xNixO2n+3-δ Substituted with nickel oxide for n=3
...Show More Authors

   on this research is to study the effect of nickel oxide substitution on the pure phases superconductor Tl0.5Pb0.5Ba2Can-1Cun-xNixO2n+3-δ (n=3) where x=(0,0.2,0.4,0.6,0.8.and 1.0). The specimens in this work were prepared with used  procedure of solid state reaction with sintering temperature 8500C for 24 h .we used technical (4-prob)to calculated and the critical temperature Tc . The results of the XRD diffraction analysis showed that the structure for pure and doped phases was tetragonal with phases high-Tc phase (1223),(1212) and low-Tc phase (1202)  and add

... Show More
View Publication Preview PDF
Crossref (26)
Crossref
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref