Preferred Language
Articles
/
alkej-710
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft has been (Cessna 172) presented. The stability and robustness of the system have been verified in a simulation experiment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 27 2018
Journal Name
Al-khwarizmi Engineering Journal
Efficiency Enhancement of a Dual-axis Solar PV Panel Tracker Using Water-Flow Double Glazing Technique
...Show More Authors

The fall angle of sun rays on the surface of a photovoltaic PV panel and its temperature is negatively affecting the panel electrical energy produced and efficiency. The fall angle problem was commonly solved by using a dual-axis solar tracker that continually maintains the panel orthogonally positioning to the sun rays all day long. This leads to maximum absorption for solar radiation necessary to produce maximum amount of energy and maintain high level of electrical efficiency. To solve the PV panel temperature problem, a Water-Flow Double Glazing WFDG technique has been introduced as a new cooling tool to reduce the panel temperature. In this paper, an integration design of the water glazing system with a dual-axis tracker has been ac

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Dual-Layer Compressive Sensing Scheme Incorporating Adaptive Cross Approximation Algorithm for Solving Monostatic Electromagnetic Scattering Problems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Class and its impact on society
...Show More Authors

Man has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
INTEGRATION BETWEEN COBIT AND COSO FOR INTERNAL CONTROL AND ITS REFLECTION ON AUDITING RISK WITH CORPORATE GOVERNANCE AS THE MEDIATING VARIABLE
...Show More Authors

Scopus (22)
Scopus
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations
...Show More Authors

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Corrеlation bеtwееn Dual-Еnеrgy X-Ray Absorptiomеtry and Panoramic Mandibular Indicеs in Prеdiction of Bonе Minеral Dеnsity in Postmеnopausal Fеmalеs
...Show More Authors

Background: Ostеoporosis is a systеmic disеasе of thе bonе that is charactеrizеd by rеducеd bonе mass, which lеads to incrеasеd bonе fragility and fracturеparticularly in postmеnopausal womеn.Thе aims of study was toеvaluatе thе rеlationship bеtwееn mandibular radiomorphomеtric indicеs obtainеd on digital panoramic radiographswith thе bonе minеral dеnsitiеs of thе lumbar spinееvaluatеd using dual-еnеrgy X-ray absorptiomеtry (DXA) scan, in a population of ostеoporotic and non-ostеoporotic fеmalеs. Matеrials and mеthods: In panoramic imagеs obtainеd from 60 fеmalе individuals dividеd еq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More