Preferred Language
Articles
/
bsj-6212
Simulation and Modelling of Electricity Usage Control and Monitoring System using ThingSpeak
...Show More Authors

Renewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of the actual smart grid system is high in cost. Thus, simulation and modelling of the system is important to see the capability of the actual system before being employed. Since the smart grid and its components are usually modeled using MATLAB/Simulink, the communication between MATLAB/Simulink, IoT platform such as ThingSpeak and mobile application is crucial to be explored to gain a better understanding of the features of the smart grid. To achieve the objectives, there are five main steps which are simulation of grid-connected photovoltaic (PV) system to generate data to be monitored and controlled using HOMER software, then, development of monitoring on ThingSpeak and mobile application using MIT App Inventor 2.  Next, the control system is developed on mobile application and the communication on how data are transferred between all the softwares are set up. The results show that all the seletected parameters can be monitored in real-time successfully. The developed mobile application can be used to control the MATLAB/Simulink in two modes. During automatic mode, ThingSpeak controls the MATLAB/Simulink by giving a zero signal (OFF) if load demand is less than the power generated by PV and a one signal (ON) if the load demand is greater than PV power. During manual mode, consumer can send ON or OFF signal to MATLAB/Simulink via the mobile application unconditionally. It is hoped that the proposed system will bring many benefits in modeling a complete smart grid system in MATLAB/Simulink.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 05 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and characterization of timed drug delivery system of sumatriptan using natural polymers
...Show More Authors

Pulsatile drug delivery systems are time-controlled dosage forms which are designed to release the active pharmaceutical ingredient after a predetermined lag time to synchronize the disease circadian rhythm. A migraine shows circadian rhythm with a marked increase in attacks between 6 a.m. and 8 a.m.

Sumatriptan is a selective agonist at serotonin (5-Hydroxy tryptamine1  (5-HT1))receptors, is an effective treatment for acute migraine attacks.

The aim of this work is to prepare time-controlled press-coated tablet with a lag time of 5.45 hrs.

Six formulas of fast dissolving core tablets and three formulas of press-coated tablets were prepared by using direct compression method using different variables to prepa

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Re-assessment and tune-up gas condensate reservoir potential in Northern Iraq using material balance and reservoir simulation result techniques
...Show More Authors
Abstract<p>The main parameter that drives oil industry contract investment and set up economic feasibility study for approving field development plan is hydrocarbon reservoir potential. So a qualified experience should be deeply afforded to correctly evaluate hydrocarbons reserve by applying different techniques at each phase of field management, through collecting and using valid and representative data sources, starting from exploration phase and tune-up by development phase. Commonly, volumetric calculation is the main technique for estimate reservoir potential using available information at exploration stage which is quite few data; in most cases, this technique estimate big figure of reserve. In this study</p> ... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using financial ratio to compare performance of the commercial and the Islamic banks Listed on Palestine Exchange
...Show More Authors

        The research aimed to compare the performance of the commercial and the  Islamic banks listed in the Palestinian's Stock Exchange .To achieve the objectives of the study we selected all  the commercial and the Islamic banks listed in the Palestinian Stock Exchange  to obtain the necessary data for the analysis process during the period of (2009-2013) .the comparison based on the performance indicators ( liquidity rate, profitability rate ,the activity rate and the market rate).

        a statistical method was used to analyze the date to find the performance differences between the commercial banks,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Simulation of Heat Storage and Heat Regeneration in Phase Change Material
...Show More Authors

The present study explores numerically the energy storage and energy regeneration during Melting and Solidification processes in Phase Change Materials (PCM) used in Latent Heat Thermal Energy Storage (LHTES) systems. Transient two-dimensional (2-D) conduction heat transfer equations with phase change have been solved utilizing the Explicit Finite Difference Method (FDM) and Grid Generation technique. A Fortran computer program was built to solve the problem. The study included four different Paraffin's. The effects of container geometrical shape, which included cylindrical and square sections of the same volume and heat transfer area, the container volume or mass of PCM, variation of mass flow rate of heat transfer fluid (HTF), and temp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the impact of internal control on tax performance using balanced score card indicators: An applied research in a sample of the branches of the General Tax Authority in Iraq
...Show More Authors

This research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu

... Show More
View Publication Preview PDF