Preferred Language
Articles
/
bBYAZ4oBVTCNdQwChJ3m
Snubber Network Design for Triac Driving Single – Phase Industrial Heater by Applying Fuzzy Logic Method
...Show More Authors

Power switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac driving 1.2 kW heater of an industrial plastic extruder machine. The similarity, between Fuzzy Logic results and conventional techniques results, is confirming the applicability of the fuzzy logic in designing these snubbing networks.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 27 2021
Journal Name
Human Interaction, Emerging Technologies And Future Systems V: Proceedings Of The 5th International Virtual Conference On Human Interaction And Emerging Technologies, Ihiet 2021, August 27-29, 2021 And The 6th Ihiet: Future Systems (ihiet-fs 2021), October 28-30, 2021, France
Electricity Consumption Forecasting in Iraq with Artificial Neural Network
...Show More Authors

Scopus (11)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Comparison of Practical Investigations for CO Emissions Emitted From Single Cylinder S. I. Engine Fueled With Different Kinds of Hydrocarbon Fuels and Hydrogen
...Show More Authors

Liquefied petroleum gas (LPG), Natural gas (NG) and hydrogen were all used to operate spark ignition internal combustion engine Ricardo E6. A comparison of CO emissions emitted from each case, with emissions emitted from engine fueled with gasoline as a fuel is conducted.

The study was accomplished when engine operated at HUCR for gasoline n(8:1), was compared with its operation at HUCR for each fuel. Compression ratio, equivalence ratio and spark timing were studied at constant speed 1500 rpm.

CO concentrations were little at lean ratios; it appeared to be effected a little with equivalence ratio in this side, at rich side its values became higher, and it appeared to be effected by equivalence ratio highly, the results s

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 23 2020
Journal Name
Medico-legal Update
Role of Endoscopic Ultrasound Guided Fine Needle Aspirate for Evaluating Lesions in or Adjacent to Gastrointestinal Tract: A Single Tertiary Care Center Experience
...Show More Authors

View Publication
Crossref
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
Heterogeneous catalytic degradation of dye by Fenton-like oxidation over a continuous system based on Box–Behnken design and traditional batch experiments
...Show More Authors

In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Fabrication and Analysis of Denture Plate Using Single Point Incremental Sheet Forming
...Show More Authors

Incremental sheet forming (ISF) is a metal forming technology in which small incremental deformations determine the final shape. The sheet is deformed by a hemispherical tool that follows the required shape contour to deform the sheet into the desired geometry. In this study, single point incremental sheet forming (SPIF) has been implemented in dentistry to manufacture a denture plate using two types of stainless steel, 304 and 316L, with an initial thickness of 0.5mm and 0.8mm, respectively. Stainless steel was selected due to its biocompatibility and reasonable cost. A three-dimensional (3D) analysis procedure was conducted to evaluate the manufactured part's geometrical accuracy and thickness distribution. The obtained results confirm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
Axillary Artery Injuries Surgical experience review in a single vascular trauma center
...Show More Authors

Background: Injuries to blood vessels are among the most dramatic challenges facing trauma surgeons because repair is often urgent, the surgeon has to decide between management options (open or endovascular), and gaining control and reconstructing a major arterial injury can be technically demanding .
Objective:,To analyze the cause of injury, surgical approach, outcome and complications of axillary artery injuries.
Methods A descriptive cross-sectional study on fifty patients at Ibn-Alnafees hospital in Baghdad from January 2005 to December 2010
Results Males were more commonly affected than female with ratio of 6.1:1. Most injuries were caused by bullet and shell (84%), followed by stab wounds (10%) and blunt trauma (6%). Pati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Biomechanical Science And Engineering
GENETIC ANALYSIS OF INTERLEUKIN 37GENE SINGLE NUCLEOTIDE POLYMORPHISMS IN ALOPECIA AREATA PATIENTS
...Show More Authors

Background: Alopecia areata(AA) is a common autoimmune disease that causes hair loss without scarring. It occurs as a result of T-helper 1 (Th1) and Th17 cells attacking the anagen hair follicles. Genetic factors play a role in the occurrence of infection, which stimulates the production of pro and anti-inflammatory interleukins. Polymorphisms of IL-37 play a role in autoimmune diseases. However, IL37 single nucleotide polymorphisms(SNP) have not been identified in patients with AA. Therefore, this study aimed to reveal the IL37 gene SNP and its relationship to AA. Methods: Genotyping of IL-37 gene single nucleotide polymorphisms SNPs were detected using sequence-specific primer-polymerase chain reaction (SSP-PCR) method was done following

... Show More
Scopus