In this study, the electro-hydraulic servo system for speed control of fixed displacement hydraulic motor using proportional valve and (PID) controller is investigated theoretically ,experimentally and simulation . The theoretical part includes the derivation of the nonlinear mathematical model equation of (valve – motor ) combination system and the derivation of the transfer function for the complete hydraulic system , the stability test of the system during the operation through the transfer function using MATLAB package
V7.1 have been done. An experimental part includes design and built hydraulic test rig and simple PID controller .The best PID gains have been calculated experimentally and simulation, speed control performance tests for the system at different thermal conditions for hydraulic oil have been done , Simulation analysis for (EHSS) using Automation Studio package V5.2 have been done . Comparison was made between experimental work and simulation work .The experimental results show good performance for (EHSS) using simple (PID) controller at hydraulic oil temperature around (60 – 70 ) and good speed response and performance for hydraulic motor with constant rotation speed (700) rpm with different load disturbance applied on the hydraulic motor .
Achieving high achievement in the sport of fencing requires thinking, awareness and visual tracking, as visual tracking is one of the important visual abilities that a fencing player needs and is considered one of the special visual abilities as it contributes and helps in the correct motor, mental and mental performance and gives the fencing the ability to perfect and accomplished performance in training and competition. Where the research problem lies in the weak skill performance of the fencing players as a result of the weakness in possessing visual and mental abilities. The two researchers used the experimental method in a controlled manner (experimental and control groups) with a pre and post-test. The research community was identifie
... Show MoreA load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
In this study, different oil fields in Mesopotamian basin, southern Iraq (Siba, Zubair, Nahr - Umr, Majnoon, Halfaya, Kumait, and Amara) were selected for studying burial history. PetroMod software 1D was used for basin constructing and to evaluate burial history of the basin. Results showed that in the upper Jurassic to the Recent, Mesopotamian Basin exhibited a complex subsidence history over a period of about 152 Ma.There are different periods of subsidence: high, moderate, and slow. High subsidence occurred at upper Jurassic- mid Cretaceous and at Miocene due to Tectonic subsidence. Slow subsidence occurred at upper Cretaceous and moderate subsidence at Paleogene. In the upper Jurassic, rapid subsidence is driven under the effect of
... Show MorePassive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show MoreIn this paper, we investigate the behavior of the bayes estimators, for the scale parameter of the Gompertz distribution under two different loss functions such as, the squared error loss function, the exponential loss function (proposed), based different double prior distributions represented as erlang with inverse levy prior, erlang with non-informative prior, inverse levy with non-informative prior and erlang with chi-square prior.
The simulation method was fulfilled to obtain the results, including the estimated values and the mean square error (MSE) for the scale parameter of the Gompertz distribution, for different cases for the scale parameter of the Gompertz distr
... Show MoreThe aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
Mobile phones are widely used nowadays, for different application such as wireless control and monitoring due to its availability and ease of use. The implemented system is based on "global system mobile (GSM)" network by using "short message service (SMS)". The design mainly contains a GSM modem and interfacing unit circuit with microcontrollers. This system could control up to eight different electrical devices such as light, Air conditioner, washing machine and many more applications which needed in daily life in different area (House, Office, or factory, etc.). The control is done by sending a specific SMS messages from traditional or smart phone. The controlling devices are restricted to a pre-defined phone number and are set in the so
... Show More