As one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second order system. The SMDO is newly designed to estimate the lumped disturbance, where the estimation error converges to zero asymptotically. The estimation of the disturbances is then used in the control law of the RSFC to reject the system's lumped disturbance. The analytical results demonstrate that the proposed method is asymptotically stable with guaranteeing the tracking error convergence to zero even in the presence of external disturbances. Finally, the comparative simulation study shows the effectiveness of proposed method for the temperature control tracking of the considered furnace application.
This paper reports test results and describes a numerical investigation of the effectiveness of using carbon fibre reinforced polymer (CFRP) fabrics for strengthening concrete cylinders that have been undamaged and damaged due to heating under preload. The purpose of this research was to investigate whether there is any difference in the performance of CFRP-wrapped cylinders if the wrapping is done under preload, and those for which neither heating, cooling nor wrapping was done under preload. The cylinders were exposed to 30% of maximum load at ambient temperature during heating and cooling before being wrapped under preload. Of 18 Ø 100 × 200 mm identical cylinders, 6 were left as control samples without heating, 12 were exposed t
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreCrude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the sa
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreConstruction and operation of (2 m) parabolic solar dish for hot water application were illustrated. The heater was designed to supply hot water up to 100 oC using the clean solar thermal energy. The system includes the design and construction of solar tracking unit in order to increase system performance. Experimental test results, which obtained from clear and sunny day, refer to highly energy-conversion efficiency and promising a well-performed water heating system.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More