Trajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of the proposed control. The comparative study shows the proposed method has superior performance than the conventional sliding mode control by achieving the controlled objectives such as a satisfactory tracking performance and an acceptable vibration reduction for the single link flexible joint robot manipulator.
Abstract
The research aimed to prepare an audit program focusing on the activities of municipal institutions related to the environmental dimension as one of the dimensions of sustainable development, and applying the program for the purpose of preparing an oversight report related to assessing the impact of the activities of municipal institutions on the environmental reality as the main channel through which municipal institutions contribute to achieving the part related to it. Among the requirements of sustainable development, the proposed program was prepared and applied to the institutions affiliated to the Directorate of Mu
... Show MoreAccording to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through
... Show MoreAfter 2003 Iraq witnessed a rapid development in the number and kind of non-governmental organizations in addition to the increase in their sources.A lot of obstacles and constraints hinder the development of the said organizations and one of the most important and prominent obstacles is their administrative and accounting structure that affect directly on the existence, continuity and survival of these organizations.This research discussed the concept the non-governmental organizations and reaching the assessment of internal control System in these organizations. Therefore, the researcher has assessed the internal control System applied National Olympic Committee of Iraq. The study showed vulnerabilities in the internal control the said
... Show MoreAbstract
Agricultural Bank is an important source of funding Specialist His role in lending to farmers, it imposes a great job in providing the necessary head for any developmental process in the agricultural sector money. The ACB of ancient Iraqi banks, and that because of its importance to the advancement of the national economy and contribute to the development and regulation of the economic sector through the support and the assignment of the Iraqi agricultural sector in various agricultural activities because it is responsible
for the process of granting agricultural loans to farmers bank.
The aim of the internal control in the agricultural banks to
... Show MoreBackground : Knee flexors tightness has been documented in apparently healthy adults and in those with musculoskeletal problems, but the influence of age on the tightness has not been studied in Iraq. This study was therefore designed to determine the influence of age on knee flexors tightness in apparently healthy subjects.Methods: Knee flexors tightness was measured using the active knee extension test (AKET) in 200 apparently healthy male and female subjects, aged 13 to 59 years. The subjects were recruited into 5 age groups using the purposive sampling technique.Knee flexors tightness was compared across the age groups using one-way analysis ofvariance (ANOVA). The independent t-test was used to compare knee flexors tightness on both
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreThis study identified intellectual and applied research in key variables (Strategic Control and Strategic Pitfalls) through internal dimensions then founded the (Federal Board of Supreme Audit) is the good area for analyzing the relationship and effect between variables by (125) questionnaire selected from (148) was distributed to the top and middle management as a seniors in controlling action. Appropriate methods, statistical tools, and programs were used to enhance the basic outputs, represented as a set of Conclusions and recommendations from the real control work with a specificity of potential Pitfalls in the effectiveness impact by Strategic Control in other dimensions which Studied.
The goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreAim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More