
ماجستير هندسة السيطرة والنظم / فرع الحاسبات
- BSc in Control and System Engineering Dep. – University of Technology (2008).
- MSc in Control and System Engineering Dep. – University of Technology (2020).
- Assistant Engineer 2008.
- Internet unit administrator 2011-2012.
- Computer unit administrator 2012-2017.
- Coordinate Islamic Philosophy from 2020 till now.
-
A Proposed Method for the Sound Recognition Process - Engineering and Technology Journal (2018). 10.30684/etj.36.8A.15.
-
Fully Automated Measurement Setup for Photovoltaic Panel Performance Evaluation and Testing under LabVIEW Platform - Journal of Advanced Research in fluid mechanics and thermal sciences (2020). https://doi.org/10.37934/arfmts.77.1.132150.
-
Performance Evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontroller - Engineering and Technology Journal (2021). https://doi.org/10.30684/etj.v39i1A.1634
Computer fundamentals
This paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MorePhotovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show More