This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers more realistic, the testing signals have been applied by a user
through a joystick interfaced to the computer. The results obtained indicated a general superiority in
performance for the Fuzzy PID controller over the PID controller used in this work. This conclusion
is based by the following figures: lesser ISA for the roll, pitch, and yaw
consequently, lesser IAE for the roll, pitch, and yaw consequently,
lesser rise time and settling time for the roll and pitch consequently, and
lesser settling time for the yaw. Moreover, the FPID gave zero overshoot versus , ,
and in the PID case for the roll, pitch, and yaw consequently. Both controllers gave zero steady
state error with close rise times for the yaw. This superiority of the FPID controller is gained as the
fuzzy part of it continuously and online adapts the parameters of the PID part.
Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreA field-pilot scale slow sand filter (SSF) was constructed at Al-Rustamiya Sewage Treatment Plant (STP) in Baghdad city to investigate the removal efficiency in terms of Biochemical Oxygen Demand (BOD5), Chemical oxygen demand (COD), Total Suspended Solids (TSS) and Chloride concentrations for achieving better secondary effluent quality from this treatment plant. The SSF was designed at a 0.2 m/h filtration rate with filter area 1 m2 and total filter depth of 2.3 m. A filter sand media 0.35 mm in size and 1 m depth was supported by 0.2 m layer of gravel of size 5 mm. The secondary effluent from Al-Rustamiya STP was used as the influent to the slow sand filter. The results showed that the removal of BOD5, COD, TSS, and Chloride were
... Show MoreA standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.