Preferred Language
Articles
/
joe-2558
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA). Matlab simulation package is used to carry out the proposed methodology that finds and tunes the optimal values of the robust PID parameters on-line. In real-time, the LabVIEW package is guided to design the on-line robust PID controller for the heating system. Numerical simulations and experimental results are compared with each other and showed the effectiveness of the proposed control methodology in terms of fast and smooth dynamic response for the heating system, especially when the control methodology considers the external disturbance attenuation problem.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 03 2010
Journal Name
Journal Of The College Of Education For Women
Analysis of Grammatical Forms and Semantic Functions of Hedging in Political Discourse: American Presidential Debate: تحلیل نماذج نحویة ذات وظائف دلالیة مستعملة في الخطاب السیاسي بوصفھ اسلوباً تحوطیاً: المناظرة الرئاسیة الاولى في الانتخابات الامریكیة
...Show More Authors

Hedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Oriental Journal Of Chemistry
Diagnosis, Structure, and In vitro Antimicrobial and Antifungal Evaluation of some Amino benzoic acids, derived Ligand Schiff base and their Mixed Complexes with Cu(II), Hg(II), Mn(II), Ni(II) and Co(II)
...Show More Authors

Innovative various Schiff bases and their Co(II), Ni(II) and Cu(II) and Hg(II)  compounds made by the condensation of 4-amino antipyrine with derived aminobenzoic acid (2-aminobenzoic acid, 3-aminobenzoic acid, and 4-aminobenzoic acid ) have been prepared by conventional approaches. These complexes were described by magnetic sensibility analysis, FT-IR spectra, and molar-conductance and elemental analysis. Analytical values appeared which the mixed-ligand complexes presented ratio about 2:1 (ligand: metal) with the chelation 4 or 6. The prepared compounds offered a good effect on the organisms; bacteria Staphylococcus-aurous, Escherichia-coli and fungi C. albicans, A. niger. Also, the biological products signalize which the mixed compl

... Show More
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Oriental Journal Of Chemistry
Diagnosis, Structure, and In vitro Antimicrobial and Antifungal Evaluation of some Amino benzoic acids, derived Ligand Schiff base and their Mixed Complexes with Cu(II), Hg(II), Mn(II), Ni(II) and Co(II)
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: II. Pairing and Exact Treatment
...Show More Authors

In an earlier paper, the basic analytical formula for particle-hole nuclear state densities was derived for non-Equidistant Spacing Model (non-ESM) approach. In this paper, an extension of the former equation was made to include pairing. Also a suggestion was made to derive the exact formula for the particle-hole state densities that depends exactly on Fermi energy and nuclear binding energies. The results indicated that the effects of pairing reduce the state density values, with similar dependence in the ESM system but with less strength. The results of the suggested exact formula indicated some modification from earlier non-ESM approximate treatment, on the cost of more calculation time

View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: I. Basic Derivation
...Show More Authors

The basic analytical formula for particle-hole state densities is derived based on the non-Equidistant Spacing Model (non-ESM) for the single-particle level density (s.p.l.d.) dependence on particle excitation energy u. Two methods are illustrated in this work, the first depends on Taylor series expansion of the s.p.l.d. about u, while the second uses direct analytical derivation of the state density formula. This treatment is applied for a system composing from one kind of fermions and for uncorrected physical system. The important corrections due to Pauli blocking was added to the present formula. Analytical comparisons with the standard formulae for ESM are made and it is shown that the solution reduces to earlier formulae providing m

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improvement of MRI Brain Images Classification Using Dragonfly Algorithm as Trainer of Artificial Neural Network
...Show More Authors

  Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Gas lift optimization: A review
...Show More Authors

Optimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura

... Show More
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Remove Reflections using Bisquare Iterative Reweighted Least Square
...Show More Authors

Reflections are ubiquitous effects in photos taken through transparent glass mediums, and represent a big problem in photography that impacts severely the performance of computer vision algorithms. Reflection removal is widely needed in daily lives with the prevalence of camera-equipped smart phones, and it is important, but it is a hard problem. This paper addresses the problem of reflection separation from two images taken from different viewpoints in front of a transparent glass medium, and proposes algorithm that exploits the natural image prior (gradient sparsity prior), and robust regression method to remove reflections. The proposed algorithm is tested on real world images, and the quantitative and visual quality comparisons were

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Activated Carbon Preparation from Date Stones by Microwave Assisted K2CO3 Activation
...Show More Authors

The preparation of activated carbon (AC) from date stones by using microwave assisted K2CO3 activation was investigated in this paper. The influence of radiation time, radiation power, and impregnation ratio on the yield and methylene blue (MB) uptake of such carbon were studied. Based on Box-Wilson central composite design, two second order polynomial models were developed to correlate the process variables to the two responses. From the analysis of variance the significant variables on each response were identified. Optimum coditions of 8 min radiation time, 660 W radiation power and 1.5 g/g impregnation ratio gave 460.123 mg/g MB uptake and 19.99 % yield. The characteristics of the AC were examined by pore structure analysis, and scan

... Show More
View Publication Preview PDF