As one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second order system. The SMDO is newly designed to estimate the lumped disturbance, where the estimation error converges to zero asymptotically. The estimation of the disturbances is then used in the control law of the RSFC to reject the system's lumped disturbance. The analytical results demonstrate that the proposed method is asymptotically stable with guaranteeing the tracking error convergence to zero even in the presence of external disturbances. Finally, the comparative simulation study shows the effectiveness of proposed method for the temperature control tracking of the considered furnace application.
Significant advances in horizontal well drilling technology have been made in recent years. The conventional productivity equations for single phase flowing at steady state conditions have been used and solved using Microsoft Excel for various reservoir properties and different horizontal well lengths.
The deviation between the actual field data, and that obtained by the software based on conventional equations have been adjusted to introduce some parameters inserted in the conventional equation.
The new formula for calculating flow efficiency was derived and applied with the best proposed values of coefficients ψ=0.7 and ω= 1.4. The simulated results fitted the field data.
Various reservoir and field parameters including late
Nineteen thrips species recorded in center of Iraq during 1999-2001, four of them was recorded by El-Haidari & Daoud, 1967; Thrips tabaci Lindeman, Retithrips syriacus (Mayet), Parascolothrips prieseri Mound, Anaphthrips sudanensis Trybom. Fifteen species are recorded for the first time in Iraq, Thrips meridionalis (Priesner), Microcephalothrips abdominals (Crawford), Scolothrips pallidus (Beach), Scolothrips sexmaculatus (Pergande), Scritothrips mangiferae Priesner, Frankliniella schultzie Trybom, Frankliniella unicolor Morgan, Frankliniella Tritici Bagnall, Retithrips aegypticus Marchal, Retithrips javanicus
... Show MoreThe main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied
Several million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up to 10%. Whereas,
... Show MoreIn this study a concentration of uranium was measured for twenty two samples of soil distributed in many regions (algolan, almoalmeen, alaskary and nasal streets) from Falluja Cityin AL-Anbar Governorate in addition to other region (alandlos street) as a back ground on the Falluja City that there is no military operations happened on it. The uranium concentrations in soil samples measured by using fission tracks registration in (PM-355) track detector that caused by the bombardment of (U) with thermal neutrons from (241Am-Be) neutron source that has flux of (5×103n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. The results shows that the uranium concentrations algolan street varies from(1.
... Show MoreSeveral million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up t
... Show MoreThis study focuses on a comparison of the performance of two similar locally-fabricated solar water heaters. One of the collectors features a new design for accelerated absorber; its risers are made of converging ducts whose exit area is half that of the entrance. The other collector is a conventional absorber, with risers of the same cross sectional area along its length. Each collector is the primary part of an indirect thermosyphon circulation solar hot water system. Both collectors face south with a fixed tilt angle of 33.3
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More