This paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the sliding mode observer, to suppress the vibration of a smart cantilever beam via the piezoelectric elements. The control spillover problem was avoided, by deriving an avoidance condition, to ensure the asymptotic stability for the proposed vibration control design. The numerical simulations were achieved to test the vibration attenuation ability of the proposed optimal control. For 15 mm initial tip displacement, the piezoelectric actuator found able to reduce the tip displacement to about 0.1 mm after 4s, while it was 1.5 mm in the open loop case. The current experimental results showed a good performance of the proposed LQR control law and the sliding mode observer, as well a good agreement with theoretical results.
Kp index correlates with the many magnetosphere properties, which are used to measure the level of magnetic activity. In the solar system, the two different planets, Mercury with weak magnetic field and Jupiter with strong magnetic field, are selected for this study to calculate the planet's magnetosphere radius (RMP) which represents the size of magnetosphere compared with solar activity through Kp index, through two types of geomagnetic conditions; quiet and strong for the period (2016-2018). From the results, we found that there are reversible relations between them during strong geomagnetic storms, while there are direct relations during quiet geomagnetic conditions. Also it is found that the
... Show MoreVideo streaming is widely available nowadays. Moreover, since the pandemic hit all across the globe, many people stayed home and used streaming services for news, education, and entertainment. However, when streaming in session, user Quality of Experience (QoE) is unsatisfied with the video content selection while streaming on smartphone devices. Users are often irritated by unpredictable video quality format displays on their smartphone devices. In this paper, we proposed a framework video selection scheme that targets to increase QoE user satisfaction. We used a video content selection algorithm to map the video selection that satisfies the user the most regarding streaming quality. Video Content Selection (VCS) are classified in
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreBackground: Marginal adaptation is critical for long – term success of crown and bridge restoration. Computer aided design / computer aided manufacture (CAD/ CAM) system is gaining more importance in the fabrication of dental restoration. Objective: The aim of this study is to evaluate the effect of crystallization firing on the vertical marginal gap of IPS. emax CAD crowns which fabricated with two different CAD/CAM systems .Materials and Methods: Twenty IPS e.max CAD crowns were fabricated. We had two major groups (A, B) (10 crowns for each group) according to the CAD/CAM system being used: Group A: fabricated with Imes - Icore CAD/CAM system; Group B: fabricated with In Lab Sirona CAD/CAM system. Each group was subdivided into two s
... Show MoreAn effort is made to study the effect of composite nanocoating using aluminum-9%wt silicon alloys reinforced with different percentage (0.5,1,2,4)wt.% of carbon nanotubes (CNTs) using plasma spraying. The effect of this composite on corrosion behavior for AA6061-T6 by extrapolation Tafel test in sea water 3.5wt% NaCl was invested. Many specimens where prepared from AA6061-T6 by the dimension (15x15x3)mm as this first set up and other steps include coating process, X-ray diffraction and SEM examination .The results show the CNTs increase the corrosion rate of the nanocomposite coatings with increasing the weight percentage of CNTs within the Al-Si matrix. Al-9wt%Si coating layer itself has less corrosion rate if compared with both n
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreIn this paper we introduce the idea of the commutator of two fuzzy subsets of a group and study the concept of the commutator of two fuzzy subsets of a group .We introduce and study some of its properties .
Background: Salivary immunoglobulin IgA plays an essential role in the immune response against dental caries. This studywas conducted to compare the salivary IgA levels and flow rate of stimulated saliva in caries active and caries free children. Materials and methods: The present study included sixty healthy children age 7-10 yearswho were divided into two groups. They were caries free and caries active children (30 children in each group). Assessment and recording of caries – experience were through the application of Decayed, Missing and Filled Tooth Index (DMFT) and (dmft) index, for permanent and deciduous teeth respectively. After dental examination, stimulated saliva samples were collected from the subjects and performed und
... Show More