This paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the sliding mode observer, to suppress the vibration of a smart cantilever beam via the piezoelectric elements. The control spillover problem was avoided, by deriving an avoidance condition, to ensure the asymptotic stability for the proposed vibration control design. The numerical simulations were achieved to test the vibration attenuation ability of the proposed optimal control. For 15 mm initial tip displacement, the piezoelectric actuator found able to reduce the tip displacement to about 0.1 mm after 4s, while it was 1.5 mm in the open loop case. The current experimental results showed a good performance of the proposed LQR control law and the sliding mode observer, as well a good agreement with theoretical results.
This study explored the development and qualities of the response of electrochemical properties of enrofloxacin-selective electrodes using precipitation based on producing phosphotungstic, after utilizing a matrix of polyvinyl chloride (PVC) and dibutyl phthalate or dibutyl phosphate as a plasticizer. The resulting membrane sensors were an enrofloxacin-phosphotungstic electrode (sensors 1) and an ENR-DOP-PTA electrode (sensors 2). Linear responses of (ENR-DBPH-PTA) and (ENR-DOP-PTA) within the concentration ranges of 2.1×10-6-10-1 and 3.0×10-6-10-2 mol. L-1, respectively, for both sensors were observed. Slopes of 51.61±0.24 and 39.40± 0.16 mV/decade and pH ranges equal to 2.5-8.5
... Show MoreSuzanne Collins’ novel The Hunger Games suggests a new logic of victory and set a distinguished focus on the unique personality of her heroin which brings to the mind the permanent correlation between all moral values. The Hunger Games World seems to be much more like one big bowl as it links the past, present, and the future. An Intertextual reference is interwoven in the present research as it brings Golding’s Lord of the Flies to the surface, and it highlights certain similarities between the two texts. In which Ralph, Piggy and Simon in Golding’s Lord of the Flies are the incarnations of stable moral values and hope of surviving ethics and rules in a chaotic and turmoil world. The event
... Show MoreThis study investigated the prevalence of quinolones resistance proteins encoding genes (qnr genes) and co-resistance for fluoroquinolones and β-lactams among clinical isolates of Klebsiella pneumoniae. Out of 150 clinical samples, 50 isolates of K. pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 15 (30%) of isolates were resistant to ciprofloxacin (≥4µg/ml), 11 (22%) of isolates were resistant to levofloxacin (≥8 µg/ml), 21 (42%) of isolates were re
... Show MoreThis study was performed on the Tigris River (Baghdad city section) during the period between December 2016 and December 2018 to assess seasonal variation in water quality using the Overall Index of Pollution (OIP). The OIP is one of the reliable tools for the assessment of surface water quality. To calculate OIP-values, eight parameters were measured ( pH, Dissolved Oxygen "DO", Biological Oxygen Demand "BOD", Total Dissolved Solid "TDS", Total Hardness "TH", calcium "Ca", Sulphate "SO4" and Alkalinity). The results showed the anthropogenic activities impact of Baghdad population that directly discharge of "inadequate treated" waste water to the river. OIP values were acceptable (1˃OIP˃ 1.7) in 2011, 2012, 2013 and 2018. However, in
... Show MoreIn this paper the reinforced materials manufactured from steel continues fibers are used in Aluminum matrix to build a composite material. Most of researches concentrated on reinforced materials and its position in the matrix according to its size and distribution, and their effects on the magnitude of different kinds of the stresses, so this paper presents and concentrate on the geometrical shape of reinforced material and its effects on the internal stresses and strains on the composite strength using FEM as a method for analysis after loaded by certain force showing the deference magnitudes of stresses according to the different geometrical shapes of reinforced materials.
To synthesize new hydrazone derivatives of naproxen with enhanced anti-inflammatory activity and devoid the ulcerogenic side effects. Hydrazones were synthesized by conjugation of naproxen hydrazide with seven natural and synthetic aldehyde and ketone by using glacial acetic acid as catalyst. The synthesis has been carried out following simple methodology in excellent isolated yields.The structure of the synthesized derivatives has been characterized by elemental microanalysis (CHN), FTIR Spectroscopy, and other physicochemical properties.The anti- inflammatory activity of the synthesized compounds was evaluated in vivo using the egg-white induced edema model in rats, and the results of the biological assay was found to be comparable to Nap
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show More