Preferred Language
Articles
/
alkej-78
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. The feed forward neural controller is trained off-line and adaptive weights are implemented on-line to find the flap angles, which controls the plunge and pitch motion of the wing. The general back propagation algorithm is used to learn the feed forward neural controller and the neural identifier. The simulation results show the effectiveness of the proposed control algorithm; this is demonstrated by the minimized tracking error to zero approximation with very acceptable settling time even with the existence of bounded external disturbances.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The rule (The inference is not invalidated by its like)
...Show More Authors

In the name of of Allah the Merciful

Research Summary

This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).

The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Applied Bionics And Biomechanics
Active Impedance Control of Bioinspired Motion Robotic Manipulators: An Overview
...Show More Authors

There are two main categories of force control schemes: hybrid position-force control and impedance control. However, the former does not take into account the dynamic interaction between the robot’s end effector and the environment. In contrast, impedance control includes regulation and stabilization of robot motion by creating a mathematical relationship between the interaction forces and the reference trajectories. It involves an energetic pair of a flow and an effort, instead of controlling a single position or a force. A mass-spring-damper impedance filter is generally used for safe interaction purposes. Tuning the parameters of the impedance filter is important and, if an unsuitable strategy is used, this can lead to unstabl

... Show More
View Publication
Scopus (57)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Sat Mar 08 2025
Journal Name
Fusion: Practice And Applications
Fast Numeric Sign Detection Using Adaptive Thresholding and Geometry of Optimized Fingers
...Show More Authors

A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as

... Show More
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of the Point Efficiency of Sieve Tray Using Artificial Neural Network
...Show More Authors

An application of neural network technique was introduced in modeling the point efficiency of sieve tray, based on a
data bank of around 33l data points collected from the open literature.Two models proposed,using back-propagation
algorithm, the first model network consists: volumetric liquid flow rate (QL), F foctor for gas (FS), liquid density (pL),
gas density (pg), liquid viscosity (pL), gas viscosity (pg), hole diameter (dH), weir height (hw), pressure (P) and surface
tension between liquid phase and gas phase (o). In the second network, there are six parameters as dimensionless
group: Flowfactor (F), Reynolds number for liquid (ReL), Reynolds number for gas through hole (Reg), ratio of weir
height to hole diqmeter

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2019
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Process Parameters That Affecting on Surface Roughness in Multi-Point Forming Process Using ANOVA Algorithm
...Show More Authors

 

Multipoint forming process is an engineering concept which means that the working surface of the punch and die is produced as hemispherical ends of individual active elements (called pins), where each pin can be independently, vertically displaced using a geometrically reconfigurable die. Several different products can be made without changing tools saved precious production time. Also, the manufacturing of very expensive rigid dies is reduced, and a lot of expenses are saved. But the most important aspects of using such types of equipment are the flexibility of the tooling. This paper presents an experimental investigation of the effect of three main parameters which are blank holder, rubber thickness and forming speed th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Journal Of Applied Mathematics
The Dynamics of a Delayed Ecoepidemiological Model with Nonlinear Incidence Rate
...Show More Authors

In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (23)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref