Proxy-based sliding mode control PSMC is an improved version of PID control that combines the features of PID and sliding mode control SMC with continuously dynamic behaviour. However, the stability of the control architecture maybe not well addressed. Consequently, this work is focused on modification of the original version of the proxy-based sliding mode control PSMC by adding an adaptive approximation compensator AAC term for vibration control of an Euler-Bernoulli beam. The role of the AAC term is to compensate for unmodelled dynamics and make the stability proof more easily. The stability of the proposed control algorithm is systematically proved using Lyapunov theory. Multi-modal equation of motion is derived using the Galerkin method. The state variables of the multi-modal equation are expressed in terms of modal amplitudes that should be regulated via the proposed control system. The proposed control structure is implemented on a simply supported beam with two piezo-patches. The simulation experiments are performed using MATLAB/SIMULINK package. The locations of piezo-transducers are optimally placed on the beam. A detailed comparison study is implemented including three scenarios. Scenario 1 includes disturbing the smart beam while no feedback loop is established (open-loop system). In scenario 2, a PD controller is applied on the vibrating beam. Whereas, scenario 3 includes implementation of the PSMC+AAC. For all previously mentioned scenarios, two types of disturbances are applied separately: 1) an impulse force of 1 N peak and 1 s pulse width, and 2) a sinusoidal disturbance with 0.5 N amplitude and 20 Hz frequency. For impulse disturbance signals, the results show the superiority of the PSMC+AAC in comparison with the conventional PD control. Whereas, both the PSMC+ACC and the PD control work well in the case of a sinusoidal disturbance signal and the superiority of the PSMC is not clear.
The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.
The study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership pos
... Show MoreMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreThe aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More