This paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fuel cell system and to achieve the stability of the desired output voltage of fuel cell. The numerical simulation results (MATLAB) package along with the schematic design experimental work using Spartan-3E xc3s500e-4fg320 board with the Xilinx development tool Integrated Software Environment (ISE) version 14.7 and using Verilog hardware description language for design testing are illustrated the performance enhancement of the proposed an adaptive intelligent FPGA-PID-NN controller in terms of error voltage reduction and generating optimal value of the hydrogen partial pressure action (PH2) without oscillation in the output and no saturation state when these results are compared with other controllers.
Transportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show MoreDue to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor i
... Show MorePraise be to God alone, and after:
This is a research entitled: “A fundamental study of judicial jurisprudence rules and their applications in the Hanbali school of thought,” in which the researcher studied eight legal jurisprudential rules considered by the Hanbalis and others.
At the conclusion of his research, the researcher reached a number of results, including: the importance of taking care of judicial rules, and the need for judges and their assistants to them, including: the need for students of science in Hanbali jurisprudence to study these rules according to the doctrine, and to highlight their applications to them, including: the importance of the rules under study, and their impact on rulings Jurisprudenc
... Show MoreThe duty of care is the essence of the error of negligence under the English legal system, and without it, responsibility for negligence cannot be judged, regardless of the extent of the damage incurred. contained in English law. In view of the importance of proving the existence of the duty of care on the defendant so that it is possible to judge his responsibility for negligence, the need arises to find a general principle to which the defendant is subject in order to decide whether he owes the plaintiff with the duty of care and therefore responsible for the negligence, and this is what we will explain in the research topic the study.
Intellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More