Preferred Language
Articles
/
_YbfQoYBIXToZYALwYBU
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is satisfied. It divides the measured data for actual power (A_p ) of the electrical model into two portions: the training portion is selected for different maximum actual powers, and the validation portion is determined based on the minimum output power consumption and then used for comparison with the actual required input power. Simulation results show the energy expenditure problem can be solved with good accuracy in energy consumption by reducing the maximum rate (A_p ) in a given time (24) hours for a single house, as well as electricity’s bill cost, is reduced.

Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Journal Of Control, Automation And Electrical Systems
Design of an Adaptive Linear Quadratic Regulator for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (6)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
A Hyperbolic Potential Field Model for Designing an Einzel Lens of Low Aberrations
...Show More Authors

An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 27 2022
Journal Name
Molecules
An insight into geometries and catalytic applications of CeO2 from a DFT outlook
...Show More Authors

Rare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Heliyon
Ground effect of an inverted double element wing diffuser on a sedan car
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 27 2021
Journal Name
Molecules
An Insight into Geometries and Catalytic Applications of CeO2 from a DFT Outlook
...Show More Authors

Rare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as

... Show More
View Publication
Scopus (26)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of-Copper Ions-from Aqueous Solution Using Liquid-Surfactant-Membrane Technique
...Show More Authors

Extraction of copper (Cu) from aqueous solution utilizing Liquid Membrane technology (LM) is more effective than precipitation method that forms sludge and must be disposed of in landfills. In this work, we have formulated a liquid surfactant membrane (LSM) that uses kerosene oil as the main diluent of LSM to remove copper ions from the aqueous waste solution through di- (2-ethylhexyl) phosphoric acid - D2EHPA- as a carrier. This technique displays several advantages including one-stage extraction and stripping process, simple operation, low energy requirement, and. In this study, the LSM process was used to transport Cu (II) ions from the feed phase to the stripping phase, which was prepared, using H2SO4. For LSM p

... Show More
View Publication Preview PDF
Crossref (11)
Crossref