Preferred Language
Articles
/
LBdoZ5IBVTCNdQwCLK_5
Practically Robust Fixed-Time Convergent Sliding Mode Control for Underactuated Aerial Flexible JointRobots Manipulators
...Show More Authors

The control of an aerial flexible joint robot (FJR) manipulator system with underactuation is a difficult task due to unavoidable factors, including, coupling, underactuation, nonlinearities, unmodeled uncertainties, and unpredictable external disturbances. To mitigate those issues, a new robust fixed-time sliding mode control (FxTSMC) is proposed by using a fixed-time sliding mode observer (FxTSMO) for the trajectory tracking problem of the FJR attached to the drones system. First, the underactuated FJR is comprehensively modeled and converted to a canonical model by employing two state transformations for ease of the control design. Then, based on the availability of the measured states, a cascaded FxTSMO (CFxTSMO) is constructed to estimate the unmeasurable variables and lumped disturbances simultaneously in fixed-time, and to effectively reduce the estimation noise. Finally, the FxTSMC scheme for a high-order underactuated FJR system is designed to guarantee that the system tracking error approaches to zero within a fixed-time that is independent of the initial conditions. The fixed-time stability of the closed-loop system of the FJR dynamics is mathematically proven by the Lyapunov theorem. Simulation investigations and hardware tests are performed to demonstrate the efficiency of the proposed controller scheme. Furthermore, the control technique developed in this research could be implemented to the various underactuated mechanical systems (UMSs), like drones, in a promising way.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Progress In Electromagnetics Research C
BANDWIDTH OPTIMISATION FOR SEMICONDUCTOR JUNCTION CIRCULATORS
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Nahrwan Clays Study for Brick Industry
...Show More Authors

Nahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Social enhancement for the kindergarten teachers
...Show More Authors

          The she/teacher is considered one of the basics of the educational process for its essential role in education and teaching the kindergarten child, thus  its lack to construct social relations in side the kindergarten environment working in it regarded one of the shortcoming factors she is suffering from which should be manipulated, because it could effect its enthusiasm to work in the kindergarten according to what has mentioned, the researcher presents the following objective:-

 

  • Identifying level of social enhancement for the kindergarten teachers via the test of the following hypothesis:-

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Perceived Self-efficacy for university students
...Show More Authors

Research was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Chemical Engineering
Microbubble Distillation for Ethanol-Water Separation
...Show More Authors

In the current study, a novel approach for separating ethanol-water mixture by microbubble distillation technology was investigated. Traditional distillation processes require large amounts of energy to raise the liquid to its boiling point to effect removal of volatile components. The concept of microbubble distillation by comparison is to heat the gas phase rather than the liquid phase to achieve separation. The removal of ethanol from the thermally sensitive fermentation broths was taken as a case of study. Consequently the results were then compared with those which could be obtained under equilibrium conditions expected in an “ideal” distillation unit. Microbubble distillation has achieved vapour compositions higher than th

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref