As one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficie
... Show MoreA harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.
ABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreTHE IMPACT OF BRITISH THEATER UPON IRAQI DRAMA
In Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreBackground: Sonographic examination is an important tool in assessment of normal and abnormal cervical lymph nodes. The aim of the study is to assess the distribution and the characteristic features of normal cervical lymph nodes in a sample of Syrian population. Materials and Methods: Fifty healthy Syrian subjects (25 men and 25 women) with an age of 20 -60years old, who had their cervical lymph nodes examined by ultrasound. Three hundred and two lymph nodes were detected. Lymph nodes were evaluated for their number, size, site, echogenic hilus, shape, as well as for the border sharpness. The subjects were categorized by age into four groups, (20 -30, 31 - 40 , 41 - 50 , 51- 60 years ). Statistical analysis of data was done using SP
... Show More