Preferred Language
Articles
/
alkej-315
High Order Sliding Mode Observer-Based Output Feedback Controller Design For Electro-Hydraulic System
...Show More Authors

A perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after canceling the perturbation term.

The numerical simulation results showed excellent performance of the proposed output feedback controller in forcing the piston position to follow the desired reference position. Moreover, the control effort spent was minimal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Aesthetic visual discourse and the audio system in theatrical performance
...Show More Authors

Technologies of the theatre show elements get great transferring concerning the creative embodiment of its aesthetic elements including its raws, forms, parts and masses in an attempt to achieve the prin cipal expressive progress to embody the main theme of the idea and the intended subject .
This is within the criterion of supporting the way to deal with technologies (décor elements , lighting music tones vocal affects , fashion and makeup) that achieving the emagintional appropriate atmosbheres which the writer and the director of the theatre show aim to make it present and succeed by furming active participation tunches of the ability of the cinogra . phic – element dsigners in order to invlve the theatre space atmospheres in cl

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Proposal Hybrid CBC Encryption System to Protect E-mail Messages
...Show More Authors

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B

... Show More
View Publication Preview PDF
Publication Date
Tue May 03 2022
Journal Name
Iraqi Journal Of Science
Study of Some Characteristics in Dielectric Barrier Discharge (DBD) System
...Show More Authors

In this present paper, an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.

Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
The dynamics of two harmful phytoplankton and herbivorous zooplankton system
...Show More Authors

In this paper, a mathematical model consisting of the two harmful
phytoplankton interacting with a herbivorous zooplankton is proposed and studied.
The existence of all possible equilibrium points is carried out. The dynamical
behaviors of the model system around biologically feasible equilibrium points are
studied. Suitable Lyapunov functions are used to construct the basins of attractions
of those points. Conditions for which the proposed model persists are established.
The occurrence of local bifurcation and a Hopf bifurcation are investigated. Finally,
to confirm our obtained analytical results and specify the vital parameters, numerical
simulations are used for a hypothetical set of parameter values.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Darboux Integrability of a Generalized 3D Chaotic Sprott ET9 System
...Show More Authors

In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Petroleum System Modeling of Halfaya Oil Field South of Iraq
...Show More Authors

The petroleum system of Halfaya oil field shows that the hydrocarbon generation of these Formations such as Sha′uiba and Nahr Umr are immature and have generated few oil TR ≤ 50% which are neglected as compared to Formations below them which are very rich source rock. The Formations of Yamama, Ratawi and Sulaiy are mature with TR ≤ 100%. Other Formations such as Sargelu ,Najma,Zubair and Gotnia are with very high maturity with TR ≥ 100% and completely generated hydrocarbon and depleted after hydrocarbon are expelled and migrate to reservoir rock of structure traps and this study indicates that the major seals of Upper Jurassic are Gotnia and Allan Formations and of Middle Miocene is LowerFars fatha Formation.

View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref