Preferred Language
Articles
/
joe-1411
Performance Evaluation of Pole Placement and Linear Quadratic Regulator Strategies Designed for Mass-Spring-Damper System Based on Simulated Annealing and Ant Colony Optimization
...Show More Authors

This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab software has been used for simulations and performance analysis. The results show the superiority of the state feedback based on the LQR controller in improving the system stability, reducing settling time, and reducing maximum overshoot. Furthermore, AC optimization shows significant advantages for optimizing the parameters of PP and LQR and reducing the fitness value in comparison with SA optimization

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
Comparative Analysis of Two Robust Strategies for an Angular Velocity Control System
...Show More Authors

In this paper, a novel flow control strategy which is the inlet throttled pump was used to design an angular velocity control system for rotary actuator. Inlet throttled systems have good performance in addition to their high efficiency compared to traditional valve controlled systems. The flow in the proposed system is adjusted by a valve that is positioned at the pump inlet with the purpose of reducing the energy loses across the valve. This regulated flow is used then to control the actuator angular velocity. The system was modeled and the open loop stability and performance were studied. In order to improve the system performance, Robust-Proportional-Integral-Derivative (RPID) and structured singular value (M@#@) controllers have been d

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
An approximate solution for solving linear system of integral equation with application on "Stiff" problems
...Show More Authors

An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly

View Publication Preview PDF
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of Corrosion Inhibitors Blend for Simulated Industrial Cooling Waters under Dynamic Conditions
...Show More Authors

   The inhibitive action of a blend of sodium nitrite/sodium hexametaphosphate (SN+SHMP) on corrosion of carbon steel in simulated cooling water systems (CWS) has been investigated by weight loss and electrochemical polarization technique. The effect of temperature, velocity, and salts concentrations on corrosion of carbon steel were studied in the absence and presence of mixed inhibiting blend. Also the effect of inhibitors blend concentrations (SN+SHMP), temperatures, and rotational velocity, i.e., Reynolds number (Re) on corrosion rate of carbon steel were investigated using Second-order Rotatable Design (Box-Wilson Design) in performing weight loss and corrosion potential approach. Electrochemical polarization measurements

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus