Preferred Language
Articles
/
ijcpe-363
PC-Based Controller for Shell and Tube Heat Exchanger
...Show More Authors

PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water flow rate (manipulated variable). The model is identified to be First Order plus Dead Time (FOPDT).
The objective of this work is to design and implement a controller to regulate the outlet temperature of hot water that is taken as controlled variable. The comparison of the designed PI controller with the PC-Based controller performance (according to rise time, percentage overshoot and settling time) shows a good agreement for PC-Based to control the system.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm
...Show More Authors
Abstract<p>Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and </p> ... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (47)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
Low-Distortion MMSE Speech Enhancement Estimator Based on Laplacian Prior
...Show More Authors

View Publication
Scopus (41)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Field study of the effect of jet grouting parameters on strength based on tensile and unconfined compressive strength
...Show More Authors
Abstract<p>The improvement of the mechanical soil characteristics of jet grouting technique is very attractive. The jet grouted soil cement columns in soft is a complicated issue because it depends on a number of factors such as, soil nature, mixture, influence among soil and grouting materials, jetting force of nozzle, jet grouting and water flow rate, rotation and lifting speed. This paper discusses the estimation of shear strength parameters of soil-cement column (soilcrete) in soft clayey soil based on the relationships between the unconfined compressive and split tensile strength for the soilcrete and the effect of the jet grouting and water pressure in the values of cohesion and internal f</p> ... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri May 21 2021
Journal Name
International Journal Of Pavement Research And Technology
Developing Resilient Modulus Prediction Models Based on Experimental Results of Crushed Hornfels Mixes with Different Gradations and Plasticity
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Comparison between Multi-Layer Perceptron and Radial Basis Function Networks in Detecting Humans Based on Object Shape
...Show More Authors

       Human detection represents a main problem of interest when using video based monitoring. In this paper, artificial neural networks, namely multilayer perceptron (MLP) and radial basis function (RBF) are used to detect humans among different objects in a sequence of frames (images) using classification approach. The classification used is based on the shape of the object instead of depending on the contents of the frame. Initially, background subtraction is depended to extract objects of interest from the frame, then statistical and geometric information are obtained from vertical and horizontal projections of the objects that are detected to stand for the shape of the object. Next to this step, two ty

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Indian Academy Of Oral Medicine And Radiology
The Degenerative Condylar Change in Temporomandibular Joint Disorder of Iraqi Population and their Variability Based on Clinical Diagnosis
...Show More Authors

Background: As a multifactorial disorder, temporomandibular joint (TMD) is difficult to diagnose, and multiple factors affect the joint and cause the temporomandibular disorder. Standardization of clinical diagnosis of TMD should be used to reach a definite clinical diagnosis; the condylar bone may degenerate in accordance with these disorders. Aims: Evaluate the correlation between the clinical diagnosis and degenerative condylar change (flattening, sclerosis, erosion, and osteophyte). Materials and Methods: A prospective study with a study group of 97 TMD patients (total of 194 joints) aged 20 to 50. Patients were sent to cone beam computed tomography (CBCT) to assess the degenerative condylar change. Results: No association was found bet

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Global Pharma Technology
Employing the Physicochemical, Spectroscopy, Antimicrobial and Antifungal Efficacy Studies of P-Hydroxy Acetophenone Based Azo Schiff Base Complexes
...Show More Authors

The azo Schiff base [Reaction of 4-aminoanypyrine and P-hydroxy acetophenone] and O-Phenylene diamine have been prepared. One azo Schiff base chelate of Co(Il), Ni(II), Cu(II) and Zn(II)ion was also prepared. The chemical frameworks of the azo Schiff base and like elemental analyses (CHN), determinations of molar conductance, 1 H &13C NMR, IR mass and electronic spectroscopy .The elemental analyses exhibited the combination of [L: M] 1:1 ratio. Established on the values IR spectral, it is showed that the azo Schiff base compound acts as neutral hexadentate ligand bonded with the metal ion from two hydroxyl, two azomethine and two azo groups of the azo Schiff base compound in chelation was confirmed by IR , 1Hand 13CNMR spectral outco

... Show More
Scopus (2)
Scopus
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref