Preferred Language
Articles
/
lheQdZIBVTCNdQwCn7C0
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Applied Energy
Novel mathematical modeling, performance analysis, and design charts for the typical hybrid photovoltaic/phase-change material (PV/PCM) system
...Show More Authors

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Applied Energy
Novel mathematical modeling, performance analysis, and design charts for the typical hybrid photovoltaic/phase-change material (PV/PCM) system
...Show More Authors

Scopus (39)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied Thermal Engineering
Experimental evaluation of thermal efficiency, electrical efficiency, and power production of low-concentrating photovoltaic-thermal system with micro-jet channel
...Show More Authors

The efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 24 2020
Journal Name
Psychology And Education
A Proposed Programme Based On Sensory Integration Theory For Remediating Some Development Learning Disabilities Among Children
...Show More Authors

The current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.

Preview PDF
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
A Proposed Management System for Construction Practices during Sustainable Buildings Life Cycle
...Show More Authors

For many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref