Preferred Language
Articles
/
joe-1937
Microgrid Integration Based on Deep Learning NARMA-L2 Controller for Maximum Power Point Tracking
...Show More Authors

This paper presents a hybrid energy resources (HER) system consisting of solar PV, storage, and utility grid. It is a challenge in real time to extract maximum power point (MPP) from the PV solar under variations of the irradiance strength.  This work addresses challenges in identifying global MPP, dynamic algorithm behavior, tracking speed, adaptability to changing conditions, and accuracy. Shallow Neural Networks using the deep learning NARMA-L2 controller have been proposed. It is modeled to predict the reference voltage under different irradiance. The dynamic PV solar and nonlinearity have been trained to track the maximum power drawn from the PV solar systems in real time.

Moreover, the proposed controller is tested under static and dynamic load conditions. The simulation and models are done by using MATLAB/Simulink. The simulation results from the proposed NARMA-L2 controller have been compared with existing Perturb and observe PO-MPPT and Incremental Conductance INC -MPPT methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 07 2020
Journal Name
Xi,an University Of Architecture &technology
The Effect of Jigsaw strategy on Academic Achievement and Engagement in Learning among the 3rd male graders students in Chemistry
...Show More Authors

The research aims to identify the effect of jigsaw strategy in learning achievement and engaging for the third grade intermediate students in chemistry. The research sample consisted of (61) students distributed in two experimental and control groups. The research tools consisted in the achievement test and the measure of engaging learning. The results showed that there are statistically significant differences at the level of (α = 0.05) between the experimental group and the control group in both the achievement test and the measure of learning involvement for the benefit of the experimental group. In this light, the researcher recommended the use of jigsaw strategy for teaching the subject matter. Lamia because of its impact in raising

... Show More
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
On the Laser Micro Cutting: Experimentation and Mathematical Modeling based on RSM-CCD
...Show More Authors

The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Implementation of Machine Learning Techniques for the Classification of Lung X-Ray Images Used to Detect COVID-19 in Humans
...Show More Authors

COVID-19 (Coronavirus disease-2019), commonly called Coronavirus or CoV, is a dangerous disease caused by the SARS-CoV-2 virus. It is one of the most widespread zoonotic diseases around the world, which started from one of the wet markets in Wuhan city. Its symptoms are similar to those of the common flu, including cough, fever, muscle pain, shortness of breath, and fatigue. This article suggests implementing machine learning techniques (Random Forest, Logistic Regression, Naïve Bayes, Support Vector Machine) by Python to classify a series of chest X-ray images that include viral pneumonia, COVID-19, and healthy (Not infected) cases in humans. The study includes more than 1400 images that are collected from the Kaggle platform. The expe

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (18)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Fourier Transform Coding-based Techniques for Lossless Iris Image Compression
...Show More Authors

     Today, the use of iris recognition is expanding globally as the most accurate and reliable biometric feature in terms of uniqueness and robustness. The motivation for the reduction or compression of the large databases of iris images becomes an urgent requirement. In general, image compression is the process to remove the insignificant or redundant information from the image details, that implicitly makes efficient use of redundancy embedded within the image itself. In addition, it may exploit human vision or perception limitations to reduce the imperceptible information.
     This paper deals with reducing the size of image, namely reducing the number of bits required in representing the

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref