In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
The main problem when dealing with fuzzy data variables is that it cannot be formed by a model that represents the data through the method of Fuzzy Least Squares Estimator (FLSE) which gives false estimates of the invalidity of the method in the case of the existence of the problem of multicollinearity. To overcome this problem, the Fuzzy Bridge Regression Estimator (FBRE) Method was relied upon to estimate a fuzzy linear regression model by triangular fuzzy numbers. Moreover, the detection of the problem of multicollinearity in the fuzzy data can be done by using Variance Inflation Factor when the inputs variable of the model crisp, output variable, and parameters are fuzzed. The results were compared usin
... Show MoreWe have studied some types of ideals in a KU-semigroup by using the concept of a bipolar fuzzy set. Bipolar fuzzy S-ideals and bipolar fuzzy k-ideals are introduced, and some properties are investigated. Also, some relations between a bipolar fuzzy k-ideal and k-ideal are discussed. Moreover, a bipolar fuzzy k-ideal under homomorphism and the product of two bipolar fuzzy k-ideals are studied.
In this study, gold nanoparticle samples were prepared by the chemical reduction method (seed-growth) with 4 ratios (10, 12, 15 and 18) ml of seed, and the growth was stationary at 40 ml. The optical and structural properties of these samples were studied. The 18 ml seed sample showed the highest absorbance. The X- ray diffraction (XRD) patterns of these samples showed clear peaks at (38.25o, 44.5o, 64.4o, and 77.95o). The UV-visible showed that the absorbance of all the samples was in the same range as the standard AuNPs. The field emission-scanning electron microscope (FE-SEM) showed the shape of AuNPs as nanorods and the particle size between 30-50 nm. Rhodamine-610 (RhB) was prepared at 10<
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreLasers, with their unique characteristics in terms of excellent beam quality, especially directionality and coherency, make them the solution that is key for many processes that require high precision. Lasers have good susceptibility to integrate with automated systems, which provides high flexibility to reach difficult zones. In addition, as a processing tool, a laser can be considered as a contact-free tool of precise tip that became attractive for high precision machining at the micro and nanoscales for different materials. All of the above advantages may be not enough unless the laser technician/engineer has enough knowledge about the mechanism of interaction between the laser light with the processed material. Several sequential phenom
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show More