Preferred Language
Articles
/
_xcQt4wBVTCNdQwCIAUZ
Estimation of domestic urban electricity consumption: A case study of Baghdad, Iraq
...Show More Authors

Electricity consumption for household purposes in urban areas widely affects the general urban consumption compared to other commercial and industrial uses, as household electricity consumption is affected by many factors related to the physical aspects of the residential area such as temperature, housing unit area, and coverage ratio, as well as social and economic factors such as family size and income, to reach the extent of the influence of each of the above factors on the amount of electricity consumed for residential uses, a selected sample of a residential area in the city of Baghdad was studied and a field survey conducted of the characteristics of that sample and the results analyzed and modeled statistically in relation to the amount of electricity consumed for residential units. Results showed that the annual electricity consumption is directly proportional to both the increase in the residential plot area and the increase in the number of residents of the housing unit and the increase in the monthly income of households, while it is inversely proportional to the plot coverage rate. Through the results of the field research, it was possible to build six quantitative models describing the behavior of electricity consumption in relation to the variables covered in the research.

Scopus Crossref
View Publication
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Lichen planopilaris is a common scarring alopecia among Iraqi population
...Show More Authors

KE Sharquie, AA Noaimi, AF Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 11

View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Materials Chemistry A
A novel approach to fabricate zeolite membranes for pervaporation processes
...Show More Authors

A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.

View Publication
Scopus (28)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Robust Adaptive Sliding Mode Controller for a Nonholonomic Mobile Platform
...Show More Authors

In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking.  The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimator a Smoothing Technique for Estimating Regression Function
...Show More Authors

    The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.

    In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes.  Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo

... Show More
View Publication Preview PDF
Crossref