This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
Objectives: To assess the level of dependence severity, locus of control, and readiness to change in male alcohol clients and measure the correlation between dependence with a locus of control and readiness to change.
Methodology: A descriptive correlational design was conducted in the substance use rehabilitation centers at psychiatric teaching hospitals in Baghdad city from November /2021 to May 2022. The instrument of the study was designed by using sociodemographic, the clinical characteristics of the client, the Short-form Alcohol Dependence Data Questionnaire (SADD), Drinking Related Internal-External Locus of Control Scale: (DRIE), and the Stages of Change Readiness and Treatment Eagerness Scale (SOCRATES). The data was co
... Show MoreIn this paper, the homotopy perturbation method is presented for solving the second kind linear mixed Volterra-Fredholm integral equations. Then, Aitken method is used to accelerate the convergence. In this method, a series will be constructed whose sum is the solution of the considered integral equation. Convergence of the constructed series is discussed, and its proof is given; the error estimation is also obtained. For more illustration, the method is applied on several examples and programs, which are written in MATLAB (R2015a) to compute the results. The absolute errors are computed to clarify the efficiency of the method.
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreWireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l
... Show MoreThe using of phytochemicals of Punica granatum to control the
snail of Bulinus truncatus the intermediate hosts of urinary
schistosomiasis in Iraq in a laboratory study.
It was found that the peel and leave of Punica granatum was
effective to control the snail with very small amount of different concentrations (30-50 mg/l) in the first day of the treatment.
First instar larvae of spiny cottcn boll wonn Earias insulana
(Bosid.) were Fed on different concentrations of biological insecticides (Agerin) and growth regulators (Match) for ( 5, 3 and one days) .The results showed that Agerin at 1.5 giL caused 99.9 , 99.9. and 96.9 % accumulative killing percentages while 0.5 g/L of this biological insecticidt::s resulted in 92.96 , 58.9 and 33.3% in the three periods of feeding
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show More