In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
The genus of Chrysobothris Eschscholtz, 1829 is one of the most diverse and widespread genera of the family Buprestidae of some 700 described species distributed throughout the world. In Iraq, particularly in the Kurdistan region, about 4 species had been recorded so far, many of these species are sympatric, share larval host plants, and are difficult to reliably separate morphologically. The current study investigates species limits and relationships among the recognized species occurring within the Erbil Province; mitochondrial cytochrome C oxidase (COX I) molecular analysis confirmed the monophyly of two Chrysobothris species, Ch. affinis (Fabricius, 1794) and Ch. chrysostigma (Linnaeus, 1758). Implications of the resultant larval mor
... Show MoreThe study is situated in the Kokoe Region of Central Buton Regency, Southeast Sulawesi, specifically in the southern part of Kabaena Island. Its primary objective is to assess the potential of nickel laterite in the designated area. The research methodology involved microscopic analysis of bedrock using a polarizing microscope, examining the drilling data, including logging descriptions, and utilizing XRF geochemical analysis (Ni, Fe, Al2O3, Co, Mg, and SiO2) from 32 drilling sites. Both elementary grade and laterite profiles were visualized using Strater 5 software to simplify the representation of laterite profiles. Petrographic analysis divided the bedrock into two lithological units: serpentinized lherzolite and serpentinite. Th
... Show MoreThe guava plant, Psidium guajava L., serves as proof of the abundant donations of nature, providing a delicious guava fruit; this plant is rich in groups of medicinal and nutritional benefits. Guava belonging to the Myrtaceae family, many previous studies reported many phytochemical constituents in its leaves that have many pharmacological activities and medicinal properties; this study focuses on the isolation, structural elucidation and calculation concentration of flavonoids, assessment of the cytotoxic activityof hyperin from Psidium guajava leaves newly cultivated in Iraq. The isolation process involved the use of thin-layer chromatography (TLC) and preparative high-performance liquid chromatography (PHPLC) and structural eluci
... Show More
Multipoint forming process is an engineering concept which means that the working surface of the punch and die is produced as hemispherical ends of individual active elements (called pins), where each pin can be independently, vertically displaced using a geometrically reconfigurable die. Several different products can be made without changing tools saved precious production time. Also, the manufacturing of very expensive rigid dies is reduced, and a lot of expenses are saved. But the most important aspects of using such types of equipment are the flexibility of the tooling. This paper presents an experimental investigation of the effect of three main parameters which are blank holder, rubber thickness and forming speed th
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreIncremental sheet metal forming is a modern technique of sheet metal forming in which a uniform sheet is locally deformed during the progressive action of a forming tool. The tool movement is governed by a CNC milling machine. The tool locally deforms by this way the sheet with pure deformation stretching. In SPIF process, the research is concentrate on the development of predict models for estimate the product quality. Using simulated annealing algorithm (SAA), Surface quality in SPIF has been modeled. In the development of this predictive model, spindle speed, feed rate and step depth have been considered as model parameters. Maximum peak height (Rz) and Arithmetic mean surface roughness (Ra) are used as response parameter to assess th
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
Bootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreDue to restrictions and limitations on agricultural water worldwide, one of the most effective ways to conserve water in this sector is to reduce the water losses and improve irrigation uniformity. Nowadays, the low-pressure sprinkler has been widely used to replace the high-pressure impact sprinklers in lateral move sprinkler irrigation systems due to its low operating cost and high efficiency. However, the hazard of surface runoff represents the biggest obstacle for low-pressure sprinkler systems. Most researchers have used the pulsing technique to apply variable-rate irrigation to match the crop water needs within a normal application rate that does not produce runoff. This research introduces a variable pulsed irrigation algorit
... Show More