44 research outputs found

    Speed control of an SPMSM using a tracking differentiator-PID controller scheme with a genetic algorithm

    Get PDF
    In this paper, a tracking differentiator-proportional integral and derivative (TD-PID) control scheme is proposed to control the speed of a surface mount permanent magnet synchronous motor (SPMSM). The TD is used to generate the necessary transient profile for both the reference and the output speed, which are compared with each other to produce the error signals that feed into the PID controller. In addition to the TD unit parameters, the PID controller’s parameters are tuned to achieve the optimum new multi-objective performance index, comprised of the integral of the time absolute error (ITAE), the absolute square of the control energy signal (USQR), and the absolute value of the control energy signal (UABS) and utilizing a genetic algorithm (GA). A nonlinear model of the SPMSM is considered in the design and the performance of the proposed TD-PID scheme was validated by comparing its performance with that of a traditional PI controller in a MATLAB environment. Different case studies were tested to show the effectiveness of the proposed scheme, results including peak overshoot, energy consumption, control signal chatter, and 30% improvement in the OPI, with variable reference speeds, load torque, and parameters uncertainties. Illustrate the proposed scheme's success compared with PI controller

    Modifying Hebbian Network for Text Cipher

    Get PDF
    The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems

    Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure

    Get PDF
    مع التوسع الثوري في الإنترنت ، تتزايد المعلومات العالمية في تطبيق تكنولوجيا الاتصالات، ويعزز النمو السريع لحجم البيانات الكبير الحاجة إلى تحقيق تقنيات آمنة وقوية وواثقة باستخدام خوارزميات فعالة مختلفة. تقدم هذه الورقة نظامًا تشفيريًا يجمع بين عدة خوارزميات لشفرة الاستبدال جنبًا إلى جنب مع هيكل بيانات طابور دائري . تقنيات الاستبدال المستخدمة هي: شفرة هوموفونك وشفرة بولي الفابيتك, قد دمجت في طابور دائري واحد مع أربعة مفاتيح مختلفة لكل منهما، والتي تنتج ثمانية مخرجات مختلفة لكل حرف وارد واحد. العمل الحالي ممكن تطبيقه بكفاءة لأمنية المعلومات الشخصية وأمنية اتصالات الشبكة كذلك.With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec

    Burning Skin Detection System in Human Body

    Get PDF
    Early accurate burn depth diagnosis is crucial for selecting the appropriate clinical intervention strategies and assessing burn patient prognosis quality. However, with limited diagnostic accuracy, the current burn depth diagnosis approach still primarily relies on the empirical subjective assessment of clinicians. With the quick development of artificial intelligence technology, integration of deep learning algorithms with image analysis technology can more accurately identify and evaluate the information in medical images. The objective of the work is to detect and classify burn area in medical images using an unsupervised deep learning algorithm. The main contribution is to developing computations using one of the deep learning algorithm. To demonstrate the effectiveness of the proposed framework, experiments are performed on the benchmark to evaluate system stability. The results indicate that, the proposed system is simple and suits real life applications. The system accuracy was 75%, when compared with some of the state-of-the-art techniques

    Novel Algorithm for Hand Gesture Modeling Using Genetic Algorithm with Variable Length Chromosome

    Get PDF
    Many languages the people can exploit for them in order to communicate among them and get the message delivered, but, these languages should be known by those people in order to understand and speak, contrarily, gesture system is the common language that can be adopted for this objective and need less knowledge as compared with spoken languages that need the grammatically and semantically rules, in this paper we applied a novel algorithm for capturing hand gesture shape using one of the evolutionary algorithms in order to fit the hand segment. Previous techniques in the literature that fully captured hand shape applied some artificial intelligent methods [1] or some statistical methods [2]. Genetic Algorithms (GAs) with variable length of chromosomes is used to model the hand structure. The most effective GA parameters used for this purpose are; the generation of initial population, tournament selection, crossover with variable position of the cutting points in the parents, artificial mutation operator, deleting of the repetitive genes in same individual, and elitism strategy. Experimental results shows the robust and efficiency of applying the proposed algorithm

    Hybrid Cipher System using Neural Network

    Get PDF
    The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In our work, there are two types of keys; the first type is the keystream that is adopted by the stream cipher stage with optimal length (length of the keystream greater or equal the message length); and the second key type is the final weights that are obtained from the learning process within the neural network stage, So we can represent our work as an update or development for using the neural network to enhance the security of stream cipher. As a result for a powerful hybrid design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems

    Kidney functions and electrolyte disturbance among Iraqi patients with bladder cancer

    Get PDF
    Background: Bladder cancer is among the most prevalent cancers worldwide, with 549,393 new cases reported in 2018. Approximately 3% of all new cancer diagnoses and 2.1% of all cancer deaths are due to urinary bladder cancer. Objectives: This study aims to explore the efficiency of renal system functions as indicated by renal function tests and electrolyte levels among bladder cancer patients. Methods: All patients in this case-control study were recruited from Ghazi Al-Hariri Hospital for surgical specialties in Baghdad during the period from December 2021 to June 2022. A total of 100 individuals were enrolled in this study and divided into two groups. The first group included 50 patients with an age range of (16-79) years. All patients were first diagnosed and investigated with a bladder mass by transurethral resection of bladder tumor (TURBT) and sent to the histopathological examination for biopsy of bladder lesion. The second group included 50 healthy individuals. Results: The results of the present study showed that all renal function tests and serum electrolyte levels were in the upper limit or within the normal range, although some of these levels were significantly different between patients and controls. Conclusion: All renal function tests were within the upper limits of the normal range as most of the bladder tumors were low-grade small-sized masses

    HAND GESTURE RECOGNITION: A LITERATURE REVIEW

    Get PDF
    ABSTRAC

    Antiplasmodial and chloroquine chemosensitizing and resistance reversal effects of coumarin derivatives against Plasmodium falciparum 3D7 and K1

    Get PDF
    Background Emergence of chloroquine (CQ) resistance among different strains of Plasmodium falciparum is the worst incident that has ever faced the dedicated efforts to eradicate malaria. The main cause of CQ resistance is over-activity of the pumping mechanism that ousts CQ outside the DV. This urged the scientists to look for other alternatives or adjuvants that augment its action. CQ The study aimed to test the potential of five coumarin derivatives, namely; umbeliferon, esculetin, scopoletine, herniarin and 3-aminocoumarine to inhibit plasmodium growth and reverse CQ resistance in Plasmodium falciparum K1 and 3D7. They are highly ubiquitous in nature and are famous by their diverse pharmacological effects. SYBRE green-1 based drug sensitivity assay was used to screen the effect of CQ and each coumarin on the parasite growth and isobologram technique was to assess the interaction of the coumarins with CQ. Effect of each coumarin on both RBCs and Vero cells stability as well as on RBCs fragility were screened to exclude any toxic impact on normal cells. On the other hand, their effect on hemozoin formation was screened to investigate about their molecular mechanism. For molecular characterization, Their antioxidant properties were determined using the conventional in vitro tests and their characters were obtained from Molinspiration Simulation Software. Results showed that all of them were safe to human cells, have weak to moderate plasmodial growth inhibitory effect and only umbeliferon, 3- aminocoumarin and esculetin has interacted effectively with CQ. These actions are neither correlated with hemozoin formation inhibition nor to the antioxidant mechanisms. Further studies recommended to investigate the mechanism of their action. Overall, all the tested coumarins are not ideal to be used in the conventional malaria therapy and only umbeliferon, 3-aminocoumarin and esculetin can be suggested to potentiate CQ action

    Lipid Peroxidation , Lipid profile and Vitamins A, E in Type ll Diabetes Mellitus

    Get PDF
    The study was designed to find out the relation between lipid peroxidation, lipoprotein levels to severity and complication of diabetes mellitus. Degree of lipid peroxidation was measured  in term of malondialdehyde (MDA) along with antioxidants, lipid profile and blood glucose in type 2 diabetes mellitus. Total 400 human subjects, out of which 200 healthy individuals of age group ( 40 - 80 years) were taken as control and 200 diabetic subjects of age group (40 - 80 years) were taken as cases.      The level of lipid peroxidation (MDA) increased as per the increase in concentration of blood glucose as well as. There was significant increase in the lipid profile except HDL cholesterol, which is decreased, also significant decrease in antioxidant vitamin E when  the major lipid soluble antioxidant vitamin presents in cell membrane and lipoproteins, which may be due to their increased consumption during the process of combating excessive free radicals generated in diabetes
    corecore