Preferred Language
Articles
/
joe-2988
DESIGN OF A CONTINUOUS SLIDING MODE CONTROLLER FOR THE ELECTRONIC THROTTLE VALVE SYSTEM
...Show More Authors

Lowering the emission, fuel economy and torque management are the essential
requirements in the recent development in the automobile industry. The main engine control
input that satisfies the above requirements is the throttling angle which adjusts the air mass
flow rate to the engine port. Due to the uncertainty and the presence of the nonlinear
components in its dynamical model, the sliding mode control theory is utilized in this work
for the throttle valve angle control system to design a robust controller for this system in the
presence of a nonlinear spring and Coulomb friction. A continuous sliding mode control law
which consists of a saturation function, instead of a signum function, and the integral of
another saturation function is used in this work. This choice for the control structure will
prevent the chattering to occurs but with a certain steady state error. On the other hand, the
addition of the integral term will effectively reduce the steady state error according to the
choice of its parameters. The simulations result for typical references of the opening throttle
angle demonstrate the effectiveness of the proposed controller, especially after the addition of
a nonlinear integral term.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The ability of solving a mathematical problem and its relation to system thinking among fifth preparatory students
...Show More Authors

The research seeks to examine the ability of fifth preparatory students in solving a mathematical problem in relation to system thinking. To this end, the researcher chose (140) fifth preparatory students from four-different secondary schools in Kirkuk city for the academic year (2016-2017). Two tests were adopted to collect study data: a test of (5) items about skills in solving math problem designed by (Al-raihan, 2006); and a test of system thinking skills designed by the researcher himself consisted of (14) items. It was divided into four skills (analyzing the main system to subsystems, eliminating all inner gaps of system, identifying the inner connection of system, and reorganizing the system). The findings indicated a good ability

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Develop Proactive System for Risk Management (DPSRM) for Lagging Investment Project in Iraq.
...Show More Authors

To finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 24 2018
Journal Name
Sensors
Adaptive Windowing Framework for Surface Electromyogram-Based Pattern Recognition System for Transradial Amputees
...Show More Authors

Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa

... Show More
View Publication
Crossref (24)
Clarivate Crossref
Publication Date
Mon Jul 03 2017
Journal Name
Iraqi New Medical Journal
Coarctation of aorta in pediatric age group: mode of presentation, early and intermediate outcomes of interventional treatment
...Show More Authors

Although rare, coarctation of aorta is a treatable cause of hypertension, transcatheter dilatation by balloon with or without stent are a well-known treatment strategy

Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Appraisal of intelligent notification system for smart university campus based internet of objects for social activities
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref