A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA). Matlab simulation package is used to carry out the proposed methodology that finds and tunes the optimal values of the robust PID parameters on-line. In real-time, the LabVIEW package is guided to design the on-line robust PID controller for the heating system. Numerical simulations and experimental results are compared with each other and showed the effectiveness of the proposed control methodology in terms of fast and smooth dynamic response for the heating system, especially when the control methodology considers the external disturbance attenuation problem.
The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs
... Show MoreSurvival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreA random laser is a non-conventional laser whose feedback mechanism is based on dissorder-induced light. However, random lasers occur in gain media with numerous scatterers and produce coherent laser emission without any predesigned cavity. The generation of coherent emission from multiple scattering is quite general and its basic principles are shown here using sulforhodamine B-TiO suspensions system. These suspensions were pumped with 337.1 nm pulses from N2 laser and the spectral and temporal behavior of light emitted from the pumped surface was recorded. When we pump power above a certain threshold a dramatic narrowing of the emission line width and a shortening of the emitted pulses were observed. We have experimentally found that i
... Show MoreIn this paper solar radiation was studied over a region of Baghdad (Latitude 33.3o and longitude 44.4o). The two parts of global solar radiation: diffuse and direct solar radiation were estimated depending on the clearance index of measured data (Average Monthly mean global solar radiation). Metrological data of measured (average monthly mean diffuse and direct solar radiation) were used to comparison the results and show the agreement between them. Results are determined by applying Liu and Jordan two models (1960). Excel 2007program is used in calculation, graphics and comparison the results.
This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show MorePortland Cement is manufactured by adding 3% gypsum to clinker which is produced by grinding, pulverizing, mixing, and then burning a raw mix of silica, and calcium carbonate. Limestone is the main source of carbonates, while clay collected from arable land is the main source of silica. The marl in the Euphrates Formation was studied as an alternative to arable lands. Nine boreholes drilled and penetrated the marl layer in selected locations at the Kufa cement quarry. Forty-one samples of marl from boreholes and four samples of limestone from the closed area were collected. The chemical content of the major oxides and the hardness of the marl layer was very encouraging as a raw material for Portland Cement as they are SiO2 (17.60),
... Show MoreThe research aims to explain the role of cloud computing technology in facilitating the application of international financial reporting standards in Iraqi banks, by preparing a checklist that included a set of paragraphs to measure the level of application of IFRSs. In those banks and then the need to use cloud computing technology, and the researchers reached a set of conclusions, including, that cloud computing technology has a role in facilitating the application of international financial reporting standards in the banks, the research sample, because of the ease it provides in preparing and saving accounting information and the possibility of accessing it in any time and from any place where the Internet service is available. T
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More