Preferred Language
Articles
/
joe-1869
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable closed-loop performance, while the H∞ controller guarantees robust stability for the closed-loop system. The validation of the techniques is demonstrated through the robust and performance gamma index, where the H∞ controller achieved a robust gamma index of 0.8591, indicating good robustness and the H2 controller achieved a performance gamma index of 2.1972, indicating a desirable performance. The robust control toolbox of MATLAB is used for simulation purposes. Overall, the paper shows that selecting a suitable, robust control strategy is crucial for designing effective control systems, and the H2 and H∞ robust control approaches are viable options for achieving this goal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Education-oriented Program on Parents' Awareness towards Adolescents' Violence Control in Baghdad City
...Show More Authors

Objective: This study aims to determine the effectiveness of health education oriented program on parents' awareness
towards adolescents' violence control.
Methodology: A quasi-experimental study was carried out in Baghdad city form 1st of April, 2008 to 1st of September,
2009. A purposive "non-probability" sample of 60 parents who have adolescents' violence in their families who were
selected according to specific criteria. The researcher divided the samples into two equal groups; the study and control
groups. The health education program, as well as a questionnaire was constructed as tools for data collection by the
researcher for the purpose of the study. Content validity was determined by a panel of experts in diffe

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Design and Comparative Study of a one and Two Stage Blumlein Circuit TEA Nitrogen Laser
...Show More Authors

Two Prototypes of Transversely Excited at atmospheric pressure (TEA) Nitrogen laser systems (One Stage Blumlein Circuit and Two Stage Blumlein Circuit) were fabricated and operated. High voltage power supply with variable operating voltage (0-20 kv) and operating current (1-3A) was built and tested successfully. The gas flow rate of 15 L/ min and 10 L/ min for OSBC and TSBC was used. The performance of the fabricated systems was studied extensively reaching to the optimum operating conditions. The obtained laser output energy for the first system has linear relationship with the applied voltage. The maximum output energy was about (1.14 mJ) with (10.40) ns pulse duration and the half-wave divergence angle was about (0.1455 m rad). In the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting standards, audit and finances in control On agricultural activity to achieve sustainable development
...Show More Authors

The agricultural activity has a great significance in the all four dimensions of sustainable development. Firstly, the economic dimension which it contributes with the GDP, as well as, it is considered as an important source to attract the investment. Secondly, the environmental dimension which also contributes with conserving of the biodiversity, combating the desertification, and increasing the farmlands. Thirdly, for its role in the social dimension to achieve the food security, to eradicate the poverty, and providing jobs. Fourthly, toward the institutional dimension as well it is considered as a source that allows all people to participate effectively, and to exchange of the local and universal experiences and perspectives. For conf

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Diagnostic ability of salivary TNF-α and RANKL to differentiate periodontitis from periodontal health (case-control study)
...Show More Authors
Background

Periodontitis is a chronic inflammation affecting the tooth-supporting periodontal tissues. It is diagnosed by measuring periodontal parameters. However, documenting this data takes effort and may not discover early periodontitis. Biomarkers may help diagnose and assess periodontitis. This study aimed to evaluate the potential diagnostic of the salivary tumor necrosis factor-α (TNF-α) and receptor-activator of nuclear factor ĸ-B-ligand (RANKL) in distinguishing between periodontitis and healthy periodontium.

Methods

The

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Compatibility between Pseudomonas fluorescens and Trichoderma harzianum in disease control of Fusarium tomato wilt under greenhouse condition .
...Show More Authors

This study was conducted to evaluate the efficacy of 6 isolates of Pseudomonas fluorescens and Trichoderma harzianum and there combination against Fusarium tomato wilt disease caused by Fusarium oxysporum F.sp. Lycopersisi under green house condition .The isolates of bacteria (B3) and Trichoderma (T1) were found to be highly effective in reducing the disease incidence to 13.3% , 21% respectively , compared to control treatment (40%).Furthermore, disease severity was reduced to 28 and 30% respectively in comparison to control (90%) .Colonization of the roots (cfu /g fresh root weight )by the two isolates whether alon or together was extremely high . The combination treatment had a high ability in reducing disease incidenece and sev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Lxxvi Международная научно-практическая конференция «Научный форум: филология, искусствоведение и культурология»
Comparative analysis of the concept and types of homonyms in Russian and Arabic
...Show More Authors

Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id

... Show More
Publication Date
Fri Apr 30 2021
Journal Name
International Medical Journal
Knowledge, Attitude, and Practice of Infection Control by Dental Students at Pedodontic Clinic, College of Dentistry, University of Baghdad, Iraq
...Show More Authors

Objectives: This study explored knowledge, attitude, and practice of infection control by dental students at College of Dentistry/ University of Baghdad, Iraq. Material and Methods: Three hundred dental students participated in this study. A self administrated questionnaire with 21 close ended questions related to use of personal protective equipments, infection control awareness, vaccination status, percutaneous exposures, and attitude towards treatment of patients with hepatitis B (HBV)/ or human immunodeficiency virus (HIV) was distributed to dental students. Data were analyzed using Statistical Package for Social Sciences (SPSS) version 21. Fisher exact and Chi-square test were used with significance level set to 0.05. Results: The

... Show More
View Publication
Scopus
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref