A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theory, the stability proof of the two closed-loop controllers and observers is presented. Comparative simulations are carried out to confirm that the proposed controller outperforms conventional methods and offers greater accuracy of temperature, humidity, and carbon dioxide concentration, having superior regulation performance in terms of a rapid finite time convergence, an outstanding disturbance rejection property, and better energy consumption. In addition to presenting the comparative simulation results from the control applications on the VAV system, the quantitative values are provided to further confirm the superiority of the proposed controller. In particular, the proposed method exhibits the shortest settling time of, respectively, 15 and 40 min to reach the expected temperature and humidity, whereas other comparative controllers require a longer time to settle down.
An experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c
This paper features the modeling and design of a pole placement and output Feedback control technique for the Active Vibration Control (AVC) of a smart flexible cantilever beam for a Single Input Single Output (SISO) case. Measurements and actuation actions done by using patches of piezoelectric layer, it is bonded to the master structure as sensor/actuator at a certain position of the cantilever beam.
The smart structure is modeled based on the concept of piezoelectric theory, Bernoulli -Euler beam theory, using Finite Element Method (FEM) and the state space techniques. The number of modes is reduced using the controllability and observability grammians retaining the first three
dominant vibratory modes, and for the reduced syste
The agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf
... Show MoreEvaluating treatment effect on interferon-alpha in female patients with systemic lupus erythematosus: a case-control study
In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.