Sliding Mode Control for Electro-Hydraulic Servo System
Shibly
Ahmed AL-Samarraie
author
Shaymaa
Mahmood Mahdi
author
Taghreed
M. Mohammad Ridha
author
Mustafa
Hussein Mishary
author
text
article
2015
eng
Abstract – This paper deals with the problem of designing a robust controller for the
electro-hydraulic position servo system (EHPSS). The sliding mode control design
methodology is utilized here to design a robust controller with respect to system
parameters uncertainty. Because the relative degree of the mechanical sub-system with
respect to hydraulic force
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
1
10
https://ijccce.uotechnology.edu.iq/article_107505_9589e0150dfa5198e80225f00deb2e38.pdf
Intelligent Neural Network with Greedy Alignment for Job-Shop Scheduling
Fatin
I. Telchy
author
Safanah
Rafaat
author
text
article
2015
eng
Abstract –Job-Shop Scheduling (JSS) processes have highly complex structure in
terms of many criteria. Because there is no limitation in the number of the process and
there are many alternative scheduling. In JSS, each order that is processed on different
machines has its own process and process order. It is very important to put these
processes into a sequence according to a certain order. In addition, some constraints
must be considered in order to obtain the appropriate tables.
In this paper, a 3-layers Feed Forward Backpropagation Neural Network (FFBNN) has
been used for two different purposes, the first one task is to obtain the priority and the
second one role is to determine the starting order of each operation within a job.
Precedence order of operations indicates the dependency of subtasks within a job,
Furthermore, the combined greedy procedure along with the back propagation algorithm
will align operations of each job until best solution is obtained. In particular, greedy
type algorithm will not always find the optimal solution. However, adding a predefined
alignment dataset along with the greedy procedure result in optimal solutions.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
11
24
https://ijccce.uotechnology.edu.iq/article_107507_d354b213a2e0c5086ca089e11c86524c.pdf
A Comparative Study on Security Features in MANETs Routing Protocols
Dr.
Israa Tahseen Al-attar
author
text
article
2015
eng
Abstract – Mobile Ad Hoc Network (MANET) is a collection of multi-hop
wireless mobile nodes that communicate with each other without centralized control or
established infrastructure. MANETs has a wide range of applications, ranging from
mobile phone application to military applications. As the application of MANETs
increases, the attacks on MANETs also increase. Due to mobility of nodes, frequent link
breakage carry out, and it's widely use, MANET’s routing is considered as a challenging
job. A vast range of research is being conducted to keep routing in MANETs robust and
secure. One of the major research areas is routing privacy. This paper presents a
description of routing protocols that have the major challenges in ad hoc networks with a
particular focus on their characteristics, functionality, and security features and makes
their comparative analysis. Further, this study will help the researchers to get an
overview of the existing protocols and suggest which protocols may perform better with
respect to varying network scenarios.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
25
37
https://ijccce.uotechnology.edu.iq/article_107508_ca7282eb68e0bf0325e20dade21b2bc0.pdf
Iris Recognition-based Security System with Canny Filter
Dr.
Hassan Jaleel Hassan
author
text
article
2015
eng
Abstract – Image identification plays a great role in industrial, remote sensing, and
military applications. It is concerned with the generation of a signature to the image.
The human iris recently has attracted of biometric-based identification and verification
research and development community. This iris is so unique that no two irises are alike,
even among identical twins in the entire human population.
In this work we propose a security system based on Iris biometric feature extraction.
The focus was on the eye image, which is devoid of the eyelid and eyelashes that is
done by using a camera which has the ability to show the iris with white background
(eye sclera) only, using a proper position of eye on camera. The system automatically
acquires the biometric data in numerical format (Iris images) by using a properly
located sensor. We are considering camera as a high quality sensor. Iris images are
typically color images that are analyzed to three bands monochrome images (Red,
Green, and Blue). Each band of monochrome image represents a grey scale image. Then
the feature extraction algorithm is used to detect Iris Effected Region (IER) for each
monochrome image, and then extract features from IER that are numerical
characterization of the underlying biometrics. Later we identify the authorized person
by comparing the features obtained from the feature extraction algorithm with the
previously stored features by producing a similarity score. This score indicates the
degree of similarity between a pair of biometrics data under consideration. Depending
on degree of similarity, authorized person can be identified.
A successful identification rate of 100% was achieved for ten person iris images.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
38
46
https://ijccce.uotechnology.edu.iq/article_107509_9aeeda752f056274145e08ea2c0a150f.pdf
English to Arabic Example-based Machine Translation System
Assist.
Prof. Suhad M. Kadhem
author
Yasir
R. Nasir
author
text
article
2015
eng
Abstract –The Example Based Machine Translation (EBMT) system retrieves
similar examples (pairs of source phrases, sentences, or texts and their translations) from
a database of examples, adapting the examples to translate new input. The Example Base
(EB) is an important component in an EBMT system. It handles the storage to support the
translation process. Thus, an efficient EB must be capable of handling a massive volume
of examples at an adequately high speed.
In this research, a new approach to reduce the redundancy problem that some EBMT
systems suffer from is suggested by designing EB using B+ tree. The EB is used to store
the examples of a particular field in a manner that reduces the redundancy of these
examples (or even sub examples) in order to provide efficient memory usage and to
minimize the search time. The lexicon of the proposed method is represented by using
two databases. One database is used for storing the English words and another database is
used for storing the English transfer grammars.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
47
63
https://ijccce.uotechnology.edu.iq/article_107511_bb36f1ab204dd4259257e6d74abea9a0.pdf
Polarization Division Multiplexing Coherent Optical OF DM Transmission Systems
Ali
Y. Fattah
author
Falah
Hasan Abdul-Baqi
author
text
article
2015
eng
Abstract –High-capacity and long-haul transmission technologies are indispensable
to develop cost-effective optical transport networks. Optical communication is rapidly
advancing toward 1-Tera bit per second (Tb/s) and beyond transport. As the available
bandwidth of Standard Single-Mode Fiber (SSMF) is limited, high Spectral Efficiency
(SE) becomes an important issue. Coherent Optical Orthogonal Frequency-Division
Multiplexing (CO-OFDM) has become one of the promising candidates due to its high
SE and resilience to linear channel impairments such as Chromatic Dispersion (CD).
In this paper, based on Optisystem 11.0 software simulation platform, the performance
of a 1.6 Tb/s (16 x 100 Gb/s) PDM-CO-OFDM transmission system is investigated
invest by using QPSK modulation format and applying Polarization Interleaving
Scheme (PIS) over 1440 km with 2 b/s/Hz spectral efficiency.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
64
76
https://ijccce.uotechnology.edu.iq/article_107512_cd213c378b3e809eb3172e8e2ba0025b.pdf
New Pseudo-Random Number Generator System Based on Jacobian Elliptic maps and Standard Map
Asst.
Prof. Dr. Luma Fayeq Jalil
author
Prof.Dr.
Hilal Hadi Saleh
author
Ekhlas
Abass Albhrany
author
text
article
2015
eng
Abstract- Chaotic systems have numerous properties, for example: mixing property,
sensitivity to initial conditions parameters, structural complexity and deterministic
dynamics. These properties were investment in the last decade for cryptographic
applications and developments of pseudorandom number/bit generator. The paper propose
new pseudorandom number (bits) generator (PRNG) based on the Jacobian elliptic chaotic
maps and standard map. The principle of the method consists in generating binary sequence
from elliptic chaotic maps of cn and sn types. These sequence positions is permuted using
standard map. The performance of the generator is studied through conventional statistical
methods and also using the NIST test suite. The results show that the produced sequences
possess high randomness statistical properties and good security level which make it
suitable for cryptographic applications.
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
University of Technology-Iraq
1811-9212
15
v.
3
no.
2015
77
89
https://ijccce.uotechnology.edu.iq/article_107515_90fa45ff9520332db62a46dcb08b93f6.pdf