Preferred Language
Articles
/
pBZCu4kBVTCNdQwCwIwB
A new analytic method to tune a fractional order PID controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time invariant system is taken as a process to be controlled and the proposed method is applied to design the controller. The resultant control system exactly fulfills the control design specification, a feature that is laked in numerical design methods. Through matlab simulation, the step response of the closed loop system with the proposed controller and a conventional PID controller demonstrate the performance of the system in terms of time domain transient response specifications (rise time, overshoot, and settling time).

Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISING CAMPAIGNS IN TV CHANNELS : (A Research Drawn from A Master Thesis)
...Show More Authors

Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.

Therefore, this research deals with television advertisements as one of the most important fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Urban improvement, a mechanism of tourism development: Tébessa (Algeria) as a model
...Show More Authors

The tourism industry has become, currently, an art, an industry and a science. It is also one of the components that make up touristic regions. Tourist attractions are no longer the exclusive visits of museums and archeological sites, but also involve other service facilities. It is, therefore, imperative that the authorities should become aware of the degradation of tourist resorts and prevent them from getting worse. Moreover, the authorities should take a set of decisions concerning the protection of the urban aspect with its historical, social, and environmental dimensions, as well as, adapting it to the modern requirements that can bring comfort to the citizens and tourists at physical and psychological levels.

View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE SOCIAL INTERACTION OF LANGUAGE IN A COMIC SERIES: A SOCIOLINGUISTIC STUDY
...Show More Authors

Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo

... Show More
View Publication
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Surgical Neurology International
Ruptured giant aneurysm of a cortical middle cerebral artery: A case report
...Show More Authors
Background:

Aneurysms of the cortical branches of the middle cerebral artery (MCA) are rare. They usually are secondary to traumatic or infectious etiologies and are rarely idiopathic. The specific characteristics of idiopathic aneurysms in such location are not well defined in the literature. The authors report a rare case of a ruptured giant idiopathic cortical MCA aneurysm with review of the available literature on this clinical entity.

Case Description:

A 24-year-old female presented with headache, disturbed level of consciousness, and right-sided weakness. Imaging studies showed a left frontoparietal intracer

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
IRAQ BETWEEN A CULTURE OF CIVIL SOCIETY AND A CULTURE OF VIOLENCE
...Show More Authors

The title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.

Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe cri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Study of a Certain Family of Multivalent Functions Associated with Subordination
...Show More Authors

The aim of this paper is to introduce a certain family of new classes of multivalent functions associated with subordination. The various results obtained here for each of these classes include coefficient estimates radius of convexity, distortion and growth theorem.  

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
A Realistic Aggregate Load Representation for A Distribution Substation in Baghdad Network
...Show More Authors

Electrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based

... Show More
View Publication Preview PDF