Preferred Language
Articles
/
joe-1869
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable closed-loop performance, while the H∞ controller guarantees robust stability for the closed-loop system. The validation of the techniques is demonstrated through the robust and performance gamma index, where the H∞ controller achieved a robust gamma index of 0.8591, indicating good robustness and the H2 controller achieved a performance gamma index of 2.1972, indicating a desirable performance. The robust control toolbox of MATLAB is used for simulation purposes. Overall, the paper shows that selecting a suitable, robust control strategy is crucial for designing effective control systems, and the H2 and H∞ robust control approaches are viable options for achieving this goal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Cooling Load Calculations For Typical Iraqi Roof And Wall Constructions Using Ashrae's RTS Method
...Show More Authors

The present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials.  Good agreement between the average theoretical and measured cooli

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 04 2019
Journal Name
Jordan Journal Of Biological Sciences
Differential Expression for Genes in Response to Drought and Salinity in Ruta graveolens Plantlets
...Show More Authors

Abiotic stress-induced genes may lead to understand the response of plants and adaptability to salinity and drought stresses. Differential display reverse transcriptase – polymerase chain reaction (DDRT-PCR) was used to investigate the differences in gene expression between drought- and salinity-stressed plantlets of Ruta graveolens. Direct and stepwise exposures to drought- or salt-responsive genes were screened in R. graveolens plantlets using the DDRT technique. Gene expression was investigated both in the control and in the salt or drought-stressed plantlets and differential banding patterns with different molecular sizes were observed using the primers OPA-01 (646,770 and 983 pb), OPA-08 (593 and 988 pb), OPA-11 (674 and 831 pb

... Show More
Preview PDF
Scopus (5)
Scopus
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of The Turkish-german Gynecological Association
Obstetric and neonatal complications in large for gestational age pregnancy with late gestational diabetes
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Hygienic, natural and geographical significance in AL-Muntadham book for lbn AI-Jouzy
...Show More Authors

This study takes its importance in the area of systemic and historical
studies because it stands on presenting such aspects from the systematic
respect and now Ibn AL-Jouzy dealt with the text of this subject and how he
was exact in telling them.
Therefore, this study sheds light on the important aspects of this
method in his book through reading and studying such texts whether they had
direct or indirect relationship with this subject.
This study is not an easy task since it is based on contriving the
intellectual aspects in the methods of lbn AL-Jouzy and how he deals with the
text of this subject in its hygienic, natural and geographical aspects in
constructing a historical method in most scripts, the gen

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Producing Bone China with local and manufactured materials as substitutes for the traditional materials
...Show More Authors

This research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Bild Law Journal
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Indole derivatives efficacy and kinetics for inhibiting carbon steel corrosion in sulfuric acid media
...Show More Authors

View Publication
Scopus (22)
Crossref (19)
Scopus Crossref