Preferred Language
Articles
/
lheQdZIBVTCNdQwCn7C0
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

Crossref
View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Content Validity-Based Evaluation Criteria System for Siting Wind-Solar Plants
...Show More Authors

     The spatial assessment criteria system for hybridizing renewable energy sources, such as hybrid solar-wind farms, is critical in selecting ideal installation sites that maximize benefits, reduce costs, protect the environment, and serve the community. However, a systematic approach to designing indicator systems is rarely used in relevant site selection studies. Therefore, the current paper attempts to present an inclusive framework based on content validity to create an effective criteria system for siting wind-solar plants. To this end, the criteria considered in the related literature are captured, and the top 10 frequent indicators are identified. The Delphi technique is used to subject commonly used factors to expert judgme

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Improving Photovoltaic Panel (PV) Efficiency via Two Axis Sun Tracking System
...Show More Authors

In this paper two axis sun tracking method is used to absorb maximum power from the sun's rays on the solar panel via calculating the sun’s altitude and azimuth angles, which describe the solar position on the Iraqi capital Baghdad for the hours 6:00, 7:00, 8:00, 9:00, 12:00, 15:00 and 17:00 per day. The angles were calculated in an average approach within one month, so certain values were determined for each month. The daily energy achieved was calculated for the solar tracking method compared with the fixed tracking method. Designed, modeled and simulated a control circuit consisting of reference position truth table, PI Controller and two servomotors that tracked the sun position to adjust the PV panel perpendicular

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

View Publication
Scopus (21)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

Crossref (18)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Hydrogen Production by Water Electrolysis Via Photovoltaic Panel
...Show More Authors

Hydrogen fuel is a good alternative to fossil fuels. It can be produced using a clean energy without contaminated emissions. This work is concerned with experimental study on hydrogen production via solar energy. Photovoltaic module is used to convert solar radiation to electrical energy. The electrical energy  is used for electrolysis of water into hydrogen and oxygen by using alkaline water electrolyzer with stainless steel electrodes. A MATLAB computer program is developed to solve a four-parameter-model and predict the characteristics of PV module under Baghdad climate conditions. The hydrogen production system is tested at different NaOH mass concentration of (50,100, 200, 300) gram. The maximum hydrogen produc

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF