Preferred Language
Articles
/
joe-1869
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable closed-loop performance, while the H∞ controller guarantees robust stability for the closed-loop system. The validation of the techniques is demonstrated through the robust and performance gamma index, where the H∞ controller achieved a robust gamma index of 0.8591, indicating good robustness and the H2 controller achieved a performance gamma index of 2.1972, indicating a desirable performance. The robust control toolbox of MATLAB is used for simulation purposes. Overall, the paper shows that selecting a suitable, robust control strategy is crucial for designing effective control systems, and the H2 and H∞ robust control approaches are viable options for achieving this goal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (26)
Crossref (6)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Eastern-european Journal Of Enterprise Technologies
Implementation of artificial neural network to achieve speed control and power saving of a belt conveyor system
...Show More Authors

According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through

... Show More
View Publication
Scopus (23)
Crossref (10)
Scopus Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (61)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Analysis of Under-Reamed Pile Subjected to Dynamic Loading in Sandy Soil
...Show More Authors
Abstract<p>Under-reamed piles are piles with enlarged bases, which may be single bulb or multi bulbs. Such piles are suitable for resisting considerable soil movement of filed up ground, soft clay, and loose sand and have the advantages of increasing the soil strength and decreasing the displacement. In the present study, the finite element method was used to analyse the performance of a single pile with under-reamed bulbs of different shapes, that is, single cone, double cone, and half and full sphere, embedded in homogeneous, poorly graded sandy soil. The model of under-reamed pile was made of reinforced concrete and the bulb located at the middle of the embedded length of the pile. The dynami</p> ... Show More
View Publication Preview PDF
Scopus (29)
Crossref (25)
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis, Characterization and Comparative Cytotoxic Evaluation of bis-(2- mercaptoacetate) gold (III) chloride
...Show More Authors

In recent years , the interest in gold (III) species have gained more and more attention for cancer chemotherapy , this was stimulating by the possibility to develop new agents with mode of action and clinical profile different from the established platinum metalodrugs.

With this frame, recently new square planar Au(III)  complexes (Au(L)(L')n); where L=SCH2COO- ; L'=HSCH2COO- had been synthesized with S/O – donor ligands.

In this article and by the aim to replace, one of (L') ligand by anion chloride ligand (which supposedly more relevant for the biodistribution of the compound than for its pharmacodynamic effects), new complex (Au(L')

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Structural Systems for Modern Architecture in Iraq Analysis Study to Dr. Qahtan Al-Madfa’i’s Architecture
...Show More Authors

Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.

      In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Robust Methods For Handling the Problem of Multicollinearity
...Show More Authors

The multiple linear regression model is an important regression model that has attracted many researchers in different fields including applied mathematics, business, medicine, and social sciences , Linear regression models involving a large number of independent variables are poorly performing due to large variation and lead to inaccurate conclusions , One of the most important problems in the regression analysis is the multicollinearity Problem, which is considered one of the most important problems that has become known to many researchers  , As well as their effects on the multiple linear regression model, In addition to multicollinearity, the problem of outliers in data is one of the difficulties in constructing the reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic control and its impact on the performance of the insurance company: Applied research in the Iraqi insurance company
...Show More Authors

Abstract:

               The current research aims to demonstrate the relationship of correlation and influence between the independent variable strategic control through its dimensions represented by (organizational structure, human resources management, commitment to specialization, defining powers and responsibilities, values and integrity) and the dependent variable the performance of the insurance company, and the degree of arrangement of these dimensions according to their importance, as well as Detection of significant differences in the sample's response to the questionnaire paragraphs in the researched company, and the research problem

... Show More
View Publication Preview PDF