Wireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed loop control system. Simulation results of WCN for ESP show smooth operation with a little bit of perturbation between transient and steady state region.
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreOilwell cementing operations are crucial for drilling and completion, preserving the well's productive life. However, weak and permeable formations pose a high risk of cement slurry loss, leading to failure. Lightweight cement, like foamed cement, is used to avoid these difficulties. This study is focused on creating a range of foamed slurry densities and examining the effect of gas concentration on their rheological properties. The foaming agent and foam stabilizer are tested, and the optimal concentration is determined to be 2% and 0.12%, respectively, by the weight of the cement.
Furthermore, the construction of samples of foam cement with different densities (0.8, 1.0, 1.2, 1.4, and 1.6) g/cc is performed to f
... Show MoreIn this paper, mesoscale modeling is performed to simulate and understand fracture behavior of two concrete composites: cement and asphalt concrete using disk-shaped compact tension (DCT) tests. Mesoscale models are used as alternative to macroscale models to obtain better realistic behavior of composite and heterogeneous materials such as cement and asphalt concrete. In mesoscale models, aggregate and matrix are represented as distinct materials and each material has its characteristic properties. Disk-shaped compact tension test is used to obtain tensile strength and fracture energy of materials. This test can be used as a better alternative to other tests such as three points bending tests because it is more convenient for both field and
... Show MoreThis study “discusses the benefit of “addition waste paper as a “new cellulose material “in mortar mixes. A partial addition of waste paper by cement weight was achieved to produce cement composite mortar. Pulp and paper is the third major industrial dumper of air, soil and water. In recent year, paper and paperboard constitute a greater portion of many countries’ urban solid discarded generation. Beside, it increases characteristic “strength due to existence “of hydrogen links “in the microstructure of “paper. Furthermore, it consume “better thermal protection. The addition percentages “of waste paper used “in this work were (5%, 10%, 15% and 20%) by “mass of cement to measure and evaluat
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.