Preferred Language
Articles
/
joe-1634
Design, Construction, and Control Tracking of Solar Thermal Concentrator by Using PLC in Erbil
...Show More Authors

This paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar power energy. This work discusses the essential stages of a two-axis prototype; implementation, solar-location strategy, the analysis in terms of theory, structural design, and material. For two-axis-prototype is implemented with the help of programmable logic control -Siemens (S7-1200) as a control unit. This study results show that a parabolic dish tracker with a cylindrical conical receiver obtains 15.25% Improved efficiency in comparison to the cylindrical receiver. According to the testing results of the prototype design, both shapes of the receiver are convenient for steam production.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
On the design of the annexation experience between splintered and dissociated sectors
...Show More Authors

The idea of the design of combination Between split – plot and split block means that an experiment conducted with a design

formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application   to show its idia and the ability to use it in many fields  especially in agricultural experiments field .

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 23 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis and Cytotoxicity Study of Primary Amides as Histone Deacetylase Inhibitors
...Show More Authors

Primary amide derivatives as histone deacetylase inhibitors (HDACIs) are very rare. This paper describes the synthesis of primary amide derivatives (compounds 6 and 7) that have the requirements to be histone deacetylase inhibitors of the zinc-binding type. Both of them exhibited good cytotoxicity against the tested cancer cell lines with much lower cytotoxicity against normal cell line.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 31 2024
Journal Name
مـجـلــة الـدراســات التربــويــة والعـلـمـيــة - كلـيــة الـتــربـيــة - الجــامـعـة العـراقـيــة ال
Synthesis, Characterization and Studies on Thermal, Antioxidant, Docking and Biological of New Ligands with Some Metal Complexes
...Show More Authors

Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Identify the main factors affecting labor productivity within different organizational structures in the Iraqi construction sector
...Show More Authors
Abstract<p>The construction sector in Iraq has faced many challenges. One of the major challenges is the lack of productivity of laborers who are working construction sites. Although research studies have been conducted to investigate, explore, and identify factors influencing labor productivity in the Middle-east region, the lack of such research studies to address these challenges in Iraq. This motivates the researcher to explore and identify the key factors affecting labor productivity in construction sites across different organizational structures (Matrix, Projectized, and functional). A survey questionnaire has been conducted using Delphi technique in order to achieve a concrete and reliab</p> ... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More