Preferred Language
Articles
/
joe-364
Design of L1 -Adaptive Controller for Single Axis Positioning Table
...Show More Authors

L1 adaptive controller has proven to provide fast adaptation with guaranteed transients in a large variety of systems. It is commonly used for controlling systems with uncertain time-varying unknown parameters. The effectiveness of  L1 adaptive controller for position control of single axis has been examined and compared with Model Reference Adaptive Controller (MRAC). The Linear servo motor is one of the main constituting elements of the x-y table which is mostly used in automation application. It is characterized by time-varying friction and disturbance.

    The tracking and steady state performances of both controllers have been assessed for two different types of input signals ramp and step inputs. The simulated results based on MATLAB (2012a) package showed that L1 adaptive controller could outperform MRAC in terms of robustness and tracking.  

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Purification and activation of the Iraqi bentonite for edible oil Production
...Show More Authors
Abstract<p>Samples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power</p> ... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Fri Jan 29 2021
Journal Name
International Journal Of Applied Mechanics And Engineering
Unified Methodology for Strength and Stress Analysis of Structural Concrete Members
...Show More Authors
Abstract<p>In this paper, a methodology is presented for determining the stress and strain in structural concrete sections, also, for estimating the ultimate combination of axial forces and bending moments that produce failure. The structural concrete member may have a cross-section with an arbitrary configuration, the concrete region may consist of a set of subregions having different characteristics (i.e., different grades of concretes, or initially identical, but working with different stress-strain diagrams due to the effect of indirect reinforcement or the effect of confinement, etc.). This methodology is considering the tensile strain softening and tension stiffening of concrete in additio</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Psychological Capital: Behavioral Insight for Study of Spirituality at the Workplace
...Show More Authors

Abstract

      This research aims to identify the role of Psychological Capital (PsyCap) in the Spirituality at the Workplace (SAW) for a sample of the teaching staff of the four Colleges of the University of Kufa reached (200) out of (470) teaching, and to achieve the objective of this research and through access to research and studies of foreign adopted researchers standards scales of research variables, since it relied on the model (Luthans, Youssef, et al., 2007) to represent the components of Psychological Capital (self-efficacy, and hope, and optimism, and resilience), and given the attention organizations in the human element because of it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Synthesis and Fabrication of In2O3: CdO Nanoparticles for NO2 Gas Sensor
...Show More Authors

The physical and morphological characteristics of porous silicon (PS) synthesized via gas sensor was assessed by electrochemical etching for a Si wafer in diluted HF acid in water (1:4) at different etching times and different currents. The morphology for PS wafers by AFM show that the average pore diameter varies from 48.63 to 72.54 nm with increasing etching time from 5 to 15min and from 72.54 to 51.37nm with increasing current from 10 to 30 mA. From the study, it was found that the gas sensitivity of In2O3: CdO semiconductor, against NO2 gas, directly correlated to the nanoparticles size, and its sensitivity increases with increasing operating temperature.

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Oct 12 2022
Journal Name
Axioms
Razy: A String Matching Algorithm for Automatic Analysis of Pathological Reports
...Show More Authors

Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Experimental Estimation of Critical Buckling Velocities for Conservative Pipes Conveying Fluid
...Show More Authors

Conservative pipes conveying fluid such as pinned-pinned (p-p), clamped–pinned (c-p) pipes and clamped-clamped (c-c) lose their stability by buckling at certain critical fluid velocities. In order to experimentally evaluate these velocities, high flow-rate pumps that demand complicated fluid circuits must be used.

     This paper studies a new experimental approach based on estimating the critical velocities from the measurement of several fundamental natural frequencies .In this approach low flow-rate pumps and simple fluid circuit can be used.

Experiments were carried out on two pipe models at three different boundary conditions. The results showed that the present approach is more accurate for est

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Approvals of the Imam nuclear for Iraqis Through the student platform
...Show More Authors

The research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher

View Publication Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
Nutritional Status of Children below Five Years in Iraq for 2018
...Show More Authors

In this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr

... Show More
Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF