Preferred Language
Articles
/
_YbfQoYBIXToZYALwYBU
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is satisfied. It divides the measured data for actual power (A_p ) of the electrical model into two portions: the training portion is selected for different maximum actual powers, and the validation portion is determined based on the minimum output power consumption and then used for comparison with the actual required input power. Simulation results show the energy expenditure problem can be solved with good accuracy in energy consumption by reducing the maximum rate (A_p ) in a given time (24) hours for a single house, as well as electricity’s bill cost, is reduced.

Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Using Ultraviolet Technique for Well Water Disinfection
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Wed Apr 12 2017
Journal Name
Int'l Journal Of Computing, Communications & Instrumentation Engg.(ijccie)
Variant Parameters effect on OFDM Estimation Power Consumption
...Show More Authors

Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Electrochemical Science And Technology
Simultaneous Removal of Cadmium and Copper from a Binary Solution by Cathodic Deposition Using a Spiral-Wound Woven Wire Meshes Packed Bed Rotating Cylinder Electrode
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Determination of cefotaxime-sodium at nanoscale level by a microflow injection cell via measuring turbidity using five irradiation sources (WSLEDs) with a single solar cell
...Show More Authors

This work presents a completely new develop an analyzer, named NAG-5SX1-1D-SSP, that is simple, accurate, reproducible, and affordable for the determination of cefotaxime sodium (CFS) in both pure and pharmaceutical drugs. The analyzer was designed according to flow injection analysis, and conducted to turbidimetric measurements. Ammonium cerium nitrate was utilized as a precipitating agent. After optimizing the conditions, the analysis system exhibited a linear range of 0.008-27 mmol. L-1 (n=29), with a limit of detection of 439.3 ng/sample, a limit of quantification of 0.4805 mg/sample, and a correlation coefficient of 0.9988. The repeatability of the responses was assessed by performing six successive injections of CFS at concentra

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Diversity and Geographical Distribution of Sand Flies Phlebotomus papatasi (Diptera: Phlebotominae) by using Geometric Morphometric Technique from two Iraqi Provinces
...Show More Authors

            The variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished.  It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
THE EFFECT OF EXERCISES USING A MINI SQUASH COURT ON IMPROVING SOME MOTOR ABILITIES AND LEARNING SOME BASIC SKILLS FOR PLAYERS AGED 10-12 YEARS
...Show More Authors

Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
THE EFFECT OF EXERCISES USING A MINI SQUASH COURT ON IMPROVING SOME MOTOR ABILITIES AND LEARNING SOME BASIC SKILLS FOR PLAYERS AGED 10-12 YEARS
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Sport Science Technology And Physical Activities
The effect of using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students
...Show More Authors

The aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF