Preferred Language
Articles
/
alkej-78
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. The feed forward neural controller is trained off-line and adaptive weights are implemented on-line to find the flap angles, which controls the plunge and pitch motion of the wing. The general back propagation algorithm is used to learn the feed forward neural controller and the neural identifier. The simulation results show the effectiveness of the proposed control algorithm; this is demonstrated by the minimized tracking error to zero approximation with very acceptable settling time even with the existence of bounded external disturbances.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 15 2020
Journal Name
Journal Of Engineering Science And Technology
INFLUENCE OF A RIVER WATER QUALITY ON THE EFFICIENCY OF WATER TREATMENT USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 11 2002
Journal Name
Iraqi Journal Of Laser
Investigating the Effects of Carbon Dioxide Laser Fluence on Oral Soft Tissue
...Show More Authors

This study investigates the surgical and thermal effects on oral soft tissues produced by CO2 laser emitting at 10.6 micrometers with three different fluences 490.79, 1226.99 and 1840.4 J/cm2. These effects are specifically; incision depth, incision width and the tissue damage width and depth. The results showed that increasing the fluence and /or the number of beam passes increase the average depths of ablation. Moreover, increasing the fluence and the number of beam passes increase the adjacent tissue damage in width and depth. Surgeons using CO2 laser should avoid multiple pulses of the laser beam over the same area, to avoid unintentional tissue damage.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
US-Russian Interventions in the Caspian-Caucasus Basin Countries after 2001: (Strategies to Re-Impose Control and Influence as a Model)
...Show More Authors

Today, the five Caspian riparian states on the shores of the Caspian Sea (Kazakhstan, Turkmenistan, Azerbaijan, Russia, and Iran) have become a front for ambitions and international and regional competition, especially in light of the features and characteristics that natural geography has endowed them with and their enjoyment of a group of economic and mineral wealth that are not optimally exploited so far which made it a strategic attraction area for international trends and interventions, especially Western ones. It is a battleground for major international companies aiming to monopolize promising industrial investments in order to impose control and influence on the region’s resources and economic wealth and thus impose their forei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Synthesis of Few New Carrier Polymers Derived from 2-hydrazinylbenzo[d]thiazole
...Show More Authors

2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Synthesis of Few New Carrier Polymers Derived from 2-hydrazinylbenzo[d]thiazole
...Show More Authors

2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Flutter Speed Limits of Cantilever Rectangular and Tapered Plates
...Show More Authors

The aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More