A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA). Matlab simulation package is used to carry out the proposed methodology that finds and tunes the optimal values of the robust PID parameters on-line. In real-time, the LabVIEW package is guided to design the on-line robust PID controller for the heating system. Numerical simulations and experimental results are compared with each other and showed the effectiveness of the proposed control methodology in terms of fast and smooth dynamic response for the heating system, especially when the control methodology considers the external disturbance attenuation problem.
Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreThis study was designed to look for certain biochemical markers(serum uric acid and serum peroxynitrite) in women presented with obesity and to compare the level of these markers with non-obese women. A total number of 63 women were recruited from outpatients and private clinics to admit in this study. The patients were grouped into non obese women (Group I) and obese women (Group II). The anthropometric and blood pressure were determined and venous blood was obtained from each patient for determination of C-reactive protein, uric acid and peroxynitrite. The results showed that there were no significant differences in age or in concomitant or associated diseases in both groups except rheumatoid arthritis which account 80% of group I and 25%
... Show MoreLong memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MorePiracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreThis study investigates the results of electrocoagulation (EC) using aluminum (Al) electrodes as anode and stainless steel (grade 316) as a cathode for removing silica, calcium, and magnesium ions from simulated cooling tower blowdown waters. The simulated water contains (50 mg/l silica, 508 mg/l calcium, and 292 mg/l magnesium). The influence of different experimental parameters, such as current density (0.5, 1, and 2 mA/cm2), initial pH(5,7, and 10), the temperature of the simulated solution(250C and 35 0C), and electrolysis time was studied. The highest removal efficiency of 80.183%, 99.21%, and 98.06% for calcium, silica, and magnesium ions, respectively, were obtained at a current de
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show More