Abstract. In this paper, a high order extended state observer (HOESO) based a sliding mode control (SMC) is proposed for a flexible joint robot (FJR) system in the presence of time varying external disturbance. A composite controller is integrated the merits of both HOESO and SMC to enhance the tracking performance of FJR system under the time varying and fast lumped disturbance. First, the HOESO estimator is constructed based on only one measured state to precisely estimate unknown system states and lumped disturbance with its high order derivatives in the FJR system. Second, the SMC scheme is designed based on such accurate estimations to govern the nominal FJR system by well compensating the estimation errors in the states and the lumped disturbance. To verify the tracking trajectory performance, several simulations have been conducted on the simulated FJR plant model. In addition, a comparative study is carried out between the proposed method and the full state feedback linearization control (FLC) with first order ESO (ESO1).
Static loads exposing to mechanical components can cause cracks, which are lead to form stress concentration regions causing the failure of structure. Generally, from 80% to 90% of structure failure is due to initiation of the cracks. Therefore, it is necessary to repair the crack and reduce its effect on the structure where the effect of the crack is modelled as an additional flexibility to the structure. In the last few years, piezoelectric materials have been considered as one of the most favourable repairing techniques. The piezoelectric material converts the applied voltage on it to a bending moment to counter the bending moment caused by the external load on the beam at the crack location. In this study, the design of the piez
... Show Moreيسعى هذا البحث الى تقديم اطار عملي ونظري حول موضوع "تأثير الاقتصاد المنزلي في تعزيز الاداء العالي" وتم اختبار مخطط الدراسة الفرضي في القطاع التعليمي الحكومي في محافظة البصرة ,ويتضمن عدد من تشكيلات الجامعة التقنية الجنوبية. واستخدمت الاستبانة والمقابلة الشخصية كأسلوب لجمع البيانات للدراسة وكان حجم العينة114 موظف. وقد استخدمت عدد من الاساليب الاحصائية لاختبار فرضيات الدراسة. واظهرت النتائج بأن هناك تأثير ايج
... Show MoreThis research aims to prepare exercises of varying resistances and muscular work exchange for 200m freestyle swimmers, in addition to these exercises’ effects on physical adequacy and the time needed to complete this distance. The experimental method is the basis for the design of the experimental group and the control group of a 100% intentionally chosen sample from a community of elite-youth swimmers of 200m freestyle swimming for the sport season of 2020-2021 at the Police Sports Club. The sample consists of 15 swimmers that were divided, randomly, into two groups; 7 of them in the experimental group while 8 were in the control group. Physical adequacy was calculated with the use of swimmers’ mechanical energy measurements
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.