This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers more realistic, the testing signals have been applied by a user
through a joystick interfaced to the computer. The results obtained indicated a general superiority in
performance for the Fuzzy PID controller over the PID controller used in this work. This conclusion
is based by the following figures: lesser ISA for the roll, pitch, and yaw
consequently, lesser IAE for the roll, pitch, and yaw consequently,
lesser rise time and settling time for the roll and pitch consequently, and
lesser settling time for the yaw. Moreover, the FPID gave zero overshoot versus , ,
and in the PID case for the roll, pitch, and yaw consequently. Both controllers gave zero steady
state error with close rise times for the yaw. This superiority of the FPID controller is gained as the
fuzzy part of it continuously and online adapts the parameters of the PID part.
In current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreThe corrosion inhibition effect of a new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) on mild steel in 1.0 M HCl was investigated using corrosion potential (ECORR) and potentiodynamic polarization. The obtained results indicated that the new furan derivative (furan-2-ylmethyl sulfanyl acetic acid furan-2-ylmethylenehydrazide) (FSFD) has a promising inhibitive effects on the corrosion of mild steel in 1.0 M HCl across all of the conditions examined. The density functional theory (DFT) study was performed on the new furan derivative (FSFD) at the B3LYP/6-311G (d, p) basis set level to explore the relation between their inhibition efficiency and molecular electro
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023