The use of a communication network in the closed loop control systems has many advantages such as remotely controlling equipment, low cost, easy to maintenance, efficient information transmission, etc. However, the Networked Control System (NCS) has many drawbacks, such as network-induce end-to-end time delay and packet loss, which lead to significant degradation in controller performance and may result in instability. Aiming at solving performance degradation in NCS, this paper propose to take the advantages and strength of the conventional Proportional-Integral-Derivative (PID), Fuzzy Logic (FL), and Gain Scheduling (GS) fundamentals to design a Fuzzy-PID like-Gain Scheduling (F-PID-GS) control technique, which has been proved to be effective in obtaining better performance. The True Time toolbox is used to establish the simulation model of the NCS. Ethernet as a communication network is simulated for different load conditions and random packet loss. The design approach is tested on a second order stepper motor. The results obtained show the effectiveness of the proposed approach in improving the overall system performance.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreThe fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal’s triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely deve
... Show MoreIn this paper we recall the definition of fuzzy length space on a fuzzy set after that we recall basic definitions and properties of fuzzy length. We define fuzzy bounded operator as an introduction to defined fuzzy length of an operator then we proved that the fuzzy length space FB ̃ ̃ consisting of all fuzzy bounded linear operators from a fuzzy length space ̃ into a fuzzy length space ̃ is fuzzy complete if ̃ is fuzzy complete. Also we proved that every finite dimensional fuzzy length space is fuzzy complete.
The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show MoreLet
be an
module, and let
be a set, let
be a soft set over
. Then
is said to be a fuzzy soft module over
iff
,
is a fuzzy submodule of
. In this paper, we introduce the concept of fuzzy soft modules over fuzzy soft rings and some of its properties and we define the concepts of quotient module, product and coproduct operations in the category of
modules.
In this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.
The method of estimating the distribution parameters for each device was the OLS method.
The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc
... Show MoreThe growth of social media is now utilized all over the world. In the past several years social media is used to communicate between person for information sharing and entertainment but now social media is also used for the hiring. This work collects data through questionnaire and online dataset on the recruitment process for three social media i.e. Facebook, Twitter, and LinkedIn. Pythagorean Fuzzy Relation (PFR) is an expansion of both Fuzzy Relationship and Fuzzy Intuitionist Relationship. The Pythagorean fuzzy set is a modern conceptual structure with greater capacity to deal with imprecision rooted in decision making. So we used this technique to identify a social media containing more number of positive respondents in recrui
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreCloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.
... Show More