Preferred Language
Articles
/
joe-526
Tuning of PID Controllers for Quadcopter System using Cultural Exchange Imperialist Competitive Algorithm
...Show More Authors

Quadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The derivation of the mathematical model was followed by the development of the controller to control the altitude, attitude, heading and position of the quadrotor in space, which is, based on the linear Proportional-Derivative- Integral (PID) controller; thus, a simplified version of the model is obtained. The gains of the controllers will be tuned using optimization techniques to improve the system's dynamic response. The standard Imperialist Competitive Algorithm (ICA) was applied to tune the PID parameters and then it was compared to Cultural Exchange Imperialist Competitive algorithm (CEICA) tuning, and the results show improvement in the proposed algorithm. The objective function results were enhanced by (23.91%) in the CEICA compared with ICA.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
مجلة المفكر الجزائر
Mechanism of Arbitration in the Stock Exchange Disputes
...Show More Authors

Mechanism of Arbitration in the Stock Exchange Disputes

Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The New Synthesis of Potassium-Exchange Zeolite A
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Semantic Exchange A study of rooting the term
...Show More Authors

The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.

View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Evaluation of home-mode ELISA system for thedetection of antibodies against Escherichia coli O157:H7 using purified lipopolysaccharide
...Show More Authors

An enzyme linked immunosorbent assay (ELISA) for the detection and quantitation of human immunoglobulin G (IgG) antibodies against vero- cytotoxine (VT) producing Escherichia coli serogroup O157:H7 was produced. E. coli O157: H7 lipopolysaccharide was extracted from locally isolated strains by using hot phenol- water method, followed by partial purification using gel filtration chromatography by sepharose- 4B. The purity of the lipopolysaccharide was checked by measuring the protein and nucleic acid content and then used as antigen. Four isolates of vero- cytotoxin producing E. coli serogroup O157:H7 was obtained by culturing 350 stool samples from children suffering from bloody diarrhea. These isolates were identified on bacteriological, s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Pluralism in Tuning the Contemporary Arab Oud Strings - Egyptian and Iraqi Schools Model: فراس ياسين جاسم
...Show More Authors

The Egyptian and Iraqi schools are one of the most important musical schools in the style of playing the oud. The influence of the style of these schools extended in the contemporary Arab world, and there were important names that emerged characterized with their style of playing. Thus, the ways of tuning the strings of oud varied between the two schools because of the difference in the ways of playing and the difference in the style of expression. The aim of the research was to identify the pluralism of the variable tunings of the strings of the contemporary Arab oud of the Egyptian and Iraqi schools, along the historical period extending from the late nineteenth and twentieth centuries to the present time. The oud has been classified i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Handbook Of Moth-flame Optimization Algorithm
Moth-Flame Optimization Algorithm, Arithmetic Optimization Algorithm, Aquila Optimizer, Gray Wolf Optimizer, and Sine Cosine Algorithm
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref