Preferred Language
Articles
/
joe-1975
SIMULATION OF OPTIMAL SPEED CONTROL FOR A DC MOTOR USING LINEAR QUADRATIC REGULATOR (LQR)
...Show More Authors


This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of financial investments using financial indicators Applied in the Middle East Bank of Iraq for investment For the fiscal period 2007-2009
...Show More Authors

The research explain the analysis of finance investments through  analyze the finance tables for commercial banks, by using the pointers to indicate the limits of economical benefit for these investments, and fix the negative deviations and as well positive, for the purpose of  diagnostic the negative (disadvantage) and develop the advantage deviation, For the importance of finance investments in the development operation and economical growth, further to that the finance investments is represent one of the most activities in the commercial banks in which aim the adequate incomes as a result of the commercial banks act to receipt the banks deposits and then make it growth and develop through  commercial advantage o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Review Article: Green Synthesis by using Different Plants to preparation Oxide Nanoparticles
...Show More Authors

Green nanotechnology is a thrilling and rising place of technology and generation that bracesthe ideas of inexperienced chemistry with ability advantages for sustainability, protection, andthe general protection from the race human. The inexperienced chemistry method introduces aproper technique for the production, processing, and alertness of much less dangerous chemicalsubstances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation intonanomaterials and the resultant bioactivities that pose very few dangerous outcomes for peopleand the environment. In the twenty-first century, nanotechnology has become a systematic

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Thu Jan 31 2019
Journal Name
International Journal Of Ambient Energy
Energy generation by membraneless microfluidic fuel cell using acidic wastewater as a fuel
...Show More Authors

A simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
A Green Synthesis of Iron/Copper Nanoparticles as a Catalytic of Fenton-like Reactions for Removal of Orange G Dye
...Show More Authors

This research paper studies the use of an environmentally and not expensive method to degrade Orange G dye (OG) from the aqueous solution, where the extract of ficus leaves has been used to fabricate the green bimetallic iron/copper nanoparticles (G-Fe/Cu-NPs). The fabricated G‑Fe/Cu-NPs were characterized utilizing scanning electron microscopy, BET, atomic force microscopy, energy dispersive spectroscopy, Fourier-transform infrared spectroscopy and zeta potential. The rounded and shaped as like spherical nanoparticles were found for G-Fe/Cu‑NPs with the size ranged 32-59 nm and the surface area was 4.452 m2/g. Then the resultant nanoparticles were utilized as a Fenton-like oxidation catalyst. The degradation efficiency of

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Feb 02 2010
Journal Name
Advances In Software Engineering
A Strategy for Automatic Quality Signing and Verification Processes for Hardware and Software Testing
...Show More Authors

We propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test ca

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conf. Proc.
Removal of chromium ions from a real wastewater of leather industry using electrocoagulation and reverse osmosis processes
...Show More Authors

This study focused on treatment of real wastewater rejected from leather industry in Al-Nahrawan city in Iraq by Electrocoagulation (EC) process followed by Reverse Osmosis (RO) process. The successive treatment was applied due to high concentration of Cr3+ ions (about 1600 ppm) rejected in wastewater of this industry and for applying EC with moderate power consumption and better results of produced water. In Electrocoagulation process (EC), the effect of NaCl concentration (1.5, 3 g/l), current density (C.D.) (15-25 mA/cm2), electrolysis time (1-2 h), and distance between electrodes (E.D.) (1-2 cm) were examined in a batch cell by implementing Taguchi experimental design. According to the results obtained from multiple regression and signa

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (16)
Scopus Crossref