A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA). Matlab simulation package is used to carry out the proposed methodology that finds and tunes the optimal values of the robust PID parameters on-line. In real-time, the LabVIEW package is guided to design the on-line robust PID controller for the heating system. Numerical simulations and experimental results are compared with each other and showed the effectiveness of the proposed control methodology in terms of fast and smooth dynamic response for the heating system, especially when the control methodology considers the external disturbance attenuation problem.
Abrus precatorius L. is an important medicinal plant belonging to family Fabaceae. The present study was conducted to perform pre-clinical safety evaluation and study the pharmacological effects of the ethanolic seeds extract of A. precatorius in management of pain, psychiatric and neurological conditions. Acute toxicity was performed to study the general behavioural pattern of mice after treatment with the test extract (single doses of 1000, 2000, 3000,4000,5000 mg/kg, body weight) and sub-acute toxicity studies were performed to study the toxic effects of the test extract (1000,2000,3000 mg/kg, per os for 14 days) on different haematological parameters, body and organ weight and histopathology of liver and kidney. The toxicological evalua
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThe effect of insecticide lamda cyhalothrin on Allium cepa L.root meristem were studied cytogenetically .Using three concentrations of the insecticide 5%, 7.5%, 10% at 6,12,24hours treatments . The insecticide significantly reduced the mitotic index at all concentrations. Moreover showed its ability to induced C – metaphase in 10% .The effects were also caused chromosome aberration like stickness in anaphase, telophase, binucleated cells, Micronuclei formation. These alternations indicating that this insecticide was effective in producing disturbance of spindle fibers.
Tests were performed on asphalt concrete specimens with (101.6 mm in diameter and 101.6 mm in height), and the results were implemented for calculating permanent deformation and resilient modulus under repeated compressive stress with different levels of stresses (0.068, 0.138 and 0.206) MPa at 40 ºC. Two types of additives namely (carbon black-asphalt) and (SBR-asphalt) were tried as rejuvenators with three percentages of (0.5, 1 and 1.5) % by weight of asphalt cement along with two ratios of AC (1 and 2) % have been implemented as rejuvenator and blended with the reclaimed asphalt concrete. Aged materials were obtained from the site. 100% Reclaimed Asphalt Pavement material from the reclaimed mixture is implemented. A
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More