A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA). Matlab simulation package is used to carry out the proposed methodology that finds and tunes the optimal values of the robust PID parameters on-line. In real-time, the LabVIEW package is guided to design the on-line robust PID controller for the heating system. Numerical simulations and experimental results are compared with each other and showed the effectiveness of the proposed control methodology in terms of fast and smooth dynamic response for the heating system, especially when the control methodology considers the external disturbance attenuation problem.
In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More
It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jackna
... Show MoreAbstract
The aim of this study was to prepare rebamipide ocular inserts in order to extend its release on the ocular surface for dry eye treatment. Solubility study was applied to the drug with or without l-arginine using different solvents. Solvent casting technique was used to prepare the inserts; l-arginine was used to solubilize the drug, hydroxypropyl methylcellulose grades (E5 and K15M) and poly ethylene glycol 200 were used as excipients. The inserts were evaluated for their physical and mechanical properties, moisture loss% and absorption %, surface pH, and in-vitro drug release. The use l-arginine exhibited an enhancement of rebamipide solubility in both deionized water and phosphate buffer (pH 7.4) by a
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe inhibitory effect of acetone, ethanol, and aqueous extracts of ten medicinal plants on β-lactamase from Staphylococcus sciuri and Klebsiella pneumoniae was investigated in vitro by starch-iodine agar plate method. The results revealed the success of starch-iodine method for the detection of the inhibition of β-lactamase activity by the various extracts of each individual plant. The acetone extracts of Catharanthus roseus, Eucalyptus camaldulensis, and Schinus terebinthifolius induced an inhibitory effect on β-lactamase from Staphylococcus sciuri. On the other hand, acetone extracts from only Eucalyptus camaldulensis, and Schinus
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreIn many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show More