Preferred Language
Articles
/
joe-1392
The Intelligent Auto-Tuning Controller Design Based on Dolphin Echo Location for Blood Glucose Monitoring System
...Show More Authors

This paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast generating insulin control action and tracking the dynamics behavior of the blood glucose level of the diabetic patients through minimizing overshoot, rise time and settling time in the transient state as well as the steady-state blood glucose level error is reduced approximately to zero and keep it in the desired glucose level, especially when we added a meal as disturbance effect.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
THE EFFECTS OF BLOOD REHEOLOGICAL ON THE FLOW THROUGH AN AXISYMMETRIC ARTERIAL STENOSIS
...Show More Authors

The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (53)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Ecological Engineering
Study of The Fermentation Conditions of the Bacillus Cereus Strain ARY73 to Produce Polyhydroxyalkanoate from Glucose
...Show More Authors

Polyhydroxyalkanoates (PHAs) have gained much attention as biodegradable polymers, many efforts are being made to minimize the cost of PHAs by finding cheap carbon source depending on the type of microorganism and fermentation conditions. The aims of this study were to evaluate the effects of different glucose concentrations and other important conditions on the PHA production by Bacillus cereus isolated from soil. Polyhydroxyalkanoates PHAs accumulated by soil microorganisms were examined by screening the isolated bacteria using Sudan B Black and Nile Blue staining process. A Gram positive strain was identified using the 16s rRNA gene, deposited in the NCBI GenBank sequence database. Different growth conditions (favorite glucose concentrat

... Show More
View Publication
Scopus (27)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 Ieee International Conference On Electro Information Technology (eit)
A high-performance non-isolated DC-DC buck converter design based on wide bandgap power devices
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Geomate
METHODOLOGY FOR MONITORING THE FLEXURAL BEHAV-IOR OF STRUCTURAL CONCRETE MEMBERS WITH UNBONDED INTERNAL STEEL
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref