Preferred Language
Articles
/
bsj-6212
Simulation and Modelling of Electricity Usage Control and Monitoring System using ThingSpeak
...Show More Authors

Renewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of the actual smart grid system is high in cost. Thus, simulation and modelling of the system is important to see the capability of the actual system before being employed. Since the smart grid and its components are usually modeled using MATLAB/Simulink, the communication between MATLAB/Simulink, IoT platform such as ThingSpeak and mobile application is crucial to be explored to gain a better understanding of the features of the smart grid. To achieve the objectives, there are five main steps which are simulation of grid-connected photovoltaic (PV) system to generate data to be monitored and controlled using HOMER software, then, development of monitoring on ThingSpeak and mobile application using MIT App Inventor 2.  Next, the control system is developed on mobile application and the communication on how data are transferred between all the softwares are set up. The results show that all the seletected parameters can be monitored in real-time successfully. The developed mobile application can be used to control the MATLAB/Simulink in two modes. During automatic mode, ThingSpeak controls the MATLAB/Simulink by giving a zero signal (OFF) if load demand is less than the power generated by PV and a one signal (ON) if the load demand is greater than PV power. During manual mode, consumer can send ON or OFF signal to MATLAB/Simulink via the mobile application unconditionally. It is hoped that the proposed system will bring many benefits in modeling a complete smart grid system in MATLAB/Simulink.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Doctrinal monotheistic modeling of religion: the impact of the political aspect on Islamic sources and books
...Show More Authors

         The political system in Indonesia, since gaining independence from the Dutch colonialism on the seventeenth of August 1945, has gone through long stages. The Indonesian constitution stipulated that the country is based on a democracy. In 1956 the first free elections were held in Indonesia, and President Sukarno announced the adoption of the directed democratic system Then, during the era of President Suharto, the state entered a phase called democracy based on the Five Pancasila principles, which is a false democracy because it served the interests of Suharto, who in his long reign had political and economic corruption leading up to 1998, when the Indonesian people revolted, and the government of Soeharto was overthrown

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 08 2024
Journal Name
New Materials, Compounds And Applications
MOLECULAR MODELLING AND THEORETICAL DESIGN OF NOVEL NIRMATRELVIR DERIVATIVES AS SARS-COV-2 ENTRY INHIBITORS
...Show More Authors

The pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression by use partial least square
...Show More Authors

Abstract

   The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Re-assessment and tune-up gas condensate reservoir potential in Northern Iraq using material balance and reservoir simulation result techniques
...Show More Authors
Abstract<p>The main parameter that drives oil industry contract investment and set up economic feasibility study for approving field development plan is hydrocarbon reservoir potential. So a qualified experience should be deeply afforded to correctly evaluate hydrocarbons reserve by applying different techniques at each phase of field management, through collecting and using valid and representative data sources, starting from exploration phase and tune-up by development phase. Commonly, volumetric calculation is the main technique for estimate reservoir potential using available information at exploration stage which is quite few data; in most cases, this technique estimate big figure of reserve. In this study</p> ... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using median rule in determining the establishment of service station between Al hasaka and Al kamishly serian cities
...Show More Authors

Research indicates that the second half of the twentieth century marked large interests in the service industry by government and private organizations in that one, and the service industry has become the bedrock of plans in achieving economic and social development. From this standpoint felt specialists and researchers the importance of transport modes, including rail, which should be available between Almnltq Civil populated as services organized by the competent authorities to achieve the active participation of citizens in economic and social development in the region and that the term services means economic activities, which are the results Pollack concrete such as accepting the situation and satisfaction them or satisfacti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Using Remote Sensing and Geographic Information Systems to Study the Change Detection in Temperature and Surface Area of Hamrin Lake
...Show More Authors

This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref