In all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FOPDT).
The conventional PI and PID control were studied and the tuning of control
parameters was found by Ziegler-Nichols reaction curve tuning method to find the
best values of proportional gain (Kc), integral time ( I) and derivative time ( D).
The conventional controller tuning is compared with IMC techniques in this work and
it was found that the Ziegler –Nichols controller provides the best control for the
disturbance and the worst for the set-point change, while the IMC controller results
show satisfactory set-point responses but sluggish disturbance responses because the
approximate FOPTD model has relatively small time delay.
Feedforward and feedforward combined with feedback control systems were used as
another strategy to compare with above strategies. Feedforward control provides a
better response to disturbance rejection than feedback control with a steady state
deviation (offset). Thus, a combined feedforward-feedback control system is preferred
in practice where feedforward control is used to reduce the effects of measurable
disturbances, while feedback trim compensates for inaccuracies in the process model,
measurement error, and unmeasured disturbances. Also the deviation (offset) in
feedforward control was eliminated.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe current study aims at using non-hatchable artemia eggs of local origin and making use of these eggs by decapsulating and presenting them as food for the larvae of the Cyprinus carpio as a source of animal protein with high nutritional value instead of throwing them away. The results showed that the second parameter (A2) was highly significant at the level (P≤0.05) in the growth rates of the larvae that were fed on decapsulated artemia eggs alone, and it was better than the two control parameters (A1), in which the larvae were fed with feed designated for Cyprinus carpio fish. It also outperformed the third parameter (A3), in which the feed was mixed with artemia eggs with 50% decapsulation, which also outperformed the control paramete
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More