Preferred Language
Articles
/
mBeSdZIBVTCNdQwC5bAw
Embedded Neural Network like PID Water Heating Controller Implementing Cycle by Cycle Power Control Scheme
...Show More Authors

This paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics in the power supply line. The smoothness of the heating process’s output response, which is a result of both empirical experiments and simulation results, demonstrates the efficacy of the suggested control mechanism, where the output response had a small ripple margin. The system performed according to design expectations and had unimpaired unity power factor throughout its operating range and no ripple was detected during its functioning.

Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Wireless And Ad Hoc Communication
Energy Aware Scheme for Underwater Wireless Sensor Networks
...Show More Authors

The development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Journal Of Engineering Research And Sciences
Images Compression using Combined Scheme of Transform Coding
...Show More Authors

Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Speaker Verification Using Hybrid Scheme for Arabic Speech
...Show More Authors

In this work , a hybrid scheme tor Arabic speech for the recognition

of  the speaker  verification  is presented  . The scheme is hybrid as utilizes the traditional digi tal signal processi ng and neural network . Kohonen neural  network has been used as a recognizer  tor speaker verification after extract spectral  features from an acoustic signal  by Fast Fourier Transformation Algorithm(FFT) .

The system was im plemented using a PENTIUM  processor , I000

MHZ compatible and MS-dos 6.2 .

 

View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Improvement of the Fault Tolerance in IoT Based Positioning Systems by Applying for Redundancy in the Controller Layer
...Show More Authors

In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS.  This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Energy generation by crystalline silicon photovoltaic network per meter square in Iraq
...Show More Authors

<span lang="EN-US">Iraqi people have been without energy for nearly two decades, even though their geographic position provides a high intensity of radiation appropriate for the construction of solar plants capable of producing significant quantities of electricity. Also, the annual sunny hours in Iraq are between 3,600 to 4,300 hours which makes it perfect to use the photovoltaics arrays to generate electricity with very high efficiency compared to many countries, especially in Europe. This paper shows the amount of electric energy generated by the meter square of crystalline silicon in the photovoltaic (PV) array that already installed in 18 states in Iraq for each month of the year. The results of the meter-square of PV arr

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by using Monte Carlo Method
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Predict the Laser Power and Recovery Period in Treatment by Endovenous Laser Ablation (EVLA)
...Show More Authors

            Eight patients (3 male and 5 female) were treated in this study by Endovenous Laser Ablation (EVLA); Mathematical models are proposed to estimate the applied laser power and to assess the recovery period. The estimations of the applied laser power and recovery period in these models will be depended mainly on the diameter of the incompetent vein.  In addition, Excel Program was utilized to find the proposed models.  A 1470 nm diode laser up to 15W continuous power (CW) was used in the treatment of venous ulcers by EVLA procedure. Following up by duplex ultrasound was started in the 1st week after the first session until the vein is completely closed. The present study concluded that the relationship both between

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by Using Monte Carlo Method
...Show More Authors

The temperature distributions are to be evaluated for the furnace of Al-Mussaib power plant. Monte Carlo simulation procedure is used to evaluate the radiation heat transfer inside the furnace, where the radiative transfer is the most important process occurring there. Weighted sum of gray-gases model is used to evaluate the radiative properties of the non gray gas in the enclosure. The energy balance equations are applied for each gas, and surface zones, and by solving these equations, both the temperature, and the heat flux are found.

   Good degree of accuracy has been obtained, when comparing the results obtained by the simulation with the data of the designing company, and the data obtained by the zonal method. In

... Show More
View Publication Preview PDF