Preferred Language
Articles
/
joe-1039
Characterization Performance of Monocrystalline Silicon Photovoltaic Module Using Experimentally Measured Data
...Show More Authors

Solar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for different weather data (solar irradiance and ambient temperature) that is gathered from October 2017 to April 2018 in the city of Baghdad. The collected data is recorded for the entire months during the time which is limited between 8:00 AM and 1:00 PM. This work demonstrates that the change in a cell temperature is directly proportional with the PV module current, while it is inversely proportional with the PV module voltage. Additionally, the output power of a PV module increases with decreasing the solar module temperature. Furthermore, the Simulink block diagram is used to evaluate the influence of weather factors on the PV module temperature by connecting to the MATLAB code. The best value from the results of this work was in March when the solar irradiance was equal to 1000 W/m2 and the results were:

Isc,exp=3.015, Isc,mod=3.25 , RE=7.79 and Voc,exp=19.67 ,Voc,mod=19.9 ,RE=1.1

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both infected a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
The effect of current density on the structures and photoluminescence of n-type porous silicon
...Show More Authors

Porous silicon (PS) layers were formed on n-type silicon (Si) wafers using Photo- electrochemical Etching technique (PEC) was used to produce porous silicon for n-type with orientation of (111). The effects of current density were investigated at: (10, 20, 30, 40, and50) mA/cm2 with etching time: 10min. X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon. The maximum crystal size of Porous Silicon is (33.9nm) and minimum is (2.6nm) The Atomic force microscopy (AFM) analysis and Field Emission Scanning Electron Microscope (FESEM) were used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency Measurement Model for Postgraduate Programs and Undergraduate Programs by Using Data Envelopment Analysis
...Show More Authors

Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.

 

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Oct 31 2025
Journal Name
Mathematical Modelling Of Engineering Problems
Heterogeneous Traffic Management in SDN-Enabled Data Center Network Using Machine Learning-SPIKE Model
...Show More Authors

Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou

... Show More
View Publication Preview PDF
Crossref