Preferred Language
Articles
/
joe-293
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback control system using PID controller to stabilize the fuel cell voltage. Particle swarm optimization technique is used to tune the PID controller gains. The voltage error and hydrogen flow rate are input and the actuator of the PID controller respectively. Simulation results showed that using PID controller with proposed model of fuel cell can successfully improve system performance in tracking output voltage under different operating conditions.

 

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 03 2005
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Renal Cell Carcinoma in Adolescents
...Show More Authors

Malignant renal neoplasm: Because benign tumors of kidney are rare, so it is a good rule that all neoplasm of kidney which are recognized clinically should be treated as malignant. They are uncommon between the ages of 7&40(l).Rcna! cell carcinoma is the most common tumor of the kidney in adult. It arises from renal tubular cells.. It is rare in children &is more frequent in men than women. It is an adenocarcinoma &is the most common neoplasm(75%) of kidney. The tumor may invade loca!Iy& metastasize by way of blood stream &the lymphatics. Regional lymph nodes are involved in approximately 30% of patients, unfortunately sign &symptoms are usually meager until the disease is advanced. Gross haematuria is the most fr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Frontiers In Cell And Developmental Biology
Hypoxia-Modified Cancer Cell Metabolism
...Show More Authors

View Publication
Scopus (346)
Crossref (358)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Optimal Control Problem To Robust Nonlinear Descriptor control Systems with Matching Condition
...Show More Authors

Abstract

    In this paper, the solutions to class of robust non-linear semi-explicit descriptor control systems with matching condition via optimal control strategy are obtained. The optimal control strategy  has been introduced and  developed in the sense that, the optimal control  solution is robust solution to the given non-linear uncertain semi-explicit descriptor control system. The necessary mathematical proofs and remarks as well as  discussions are also proposed. The present approach is step-by-step illustrated by application example to show its effectiveness a and efficiency to compensate  the structure uncertainty in the given semi-explicit (descriptor) control

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 05 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
The Impact of Artificial Intelligence on Computational Thinking in Education at University
...Show More Authors

This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Height-to-Length Ratio Effect on the Response of Unreinforced Masonry Wall Subjected to Vertical Load Using Detailed-Micro Modeling Approach
...Show More Authors

This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 15 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Simulation and Modeling of Detailed Load flow Analysis for the 400kVA and 132kVA Iraqi Grid
...Show More Authors

A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh

... Show More
View Publication Preview PDF
Crossref