18 research outputs found

    Iraqi Economy and Renewable Energy Projects Between Economic Necessity and Investment Challenges

    Get PDF
    Purpose: Given Iraq's current excessive fossil fuel output, this article seeks to investigate the country's potential for future renewable energy sources. The report also endeavors to foresee Iraq's future position in clean energy production in Iraq and throughout the globe and the rate at which the global energy market will shift towards renewable energy sources.   Theoretical framework: Iraq's reliance on oil earnings and the country's overburdened public sector poses serious economic issues. There is a domination of state-owned firms, stringent laws, a need for more access to finance, a shortage of competent labor, and poor infrastructure that limits the expansion of numerous industries. Growth in recent years has not led to decreased poverty since the economy has changed greatly since 2014.   Design/Methodology/Approach: The study included both retrospective and prospective approaches. The most pressing problems in implementing and making use of renewable energy sources were described and analyzed descriptively. Future outcomes for the Iraqi economy were envisioned using a prospective approach in the form of development scenarios.   Findings: A significant source of international capital flows and a key source of funding for economic growth, foreign direct investment (FDI) has mostly focused on the oil industry and certain tourism projects. As a result of the country's outdated energy grid, investors are interested in something other than investing in Iraq's electrical industry.   Research, practical & social implications: We describe the current issues confronting Iraqi economic development, including the need for more diversity in the economy, structural imbalances between the main sectors, and the near-total dependence on crude oil export revenues, resulting in a decline in industrial production.   Originality/Value: We describe the reality of the Iraqi economy, analyze the structure of Iraq's energy sector based on conventional energy, and then find out about the progress made in renewable energy and existing and future projects under fossil fuels

    A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective

    Get PDF
    Mobile Ad-Hoc Network (MANET) is a type of structure-less wireless mobile network, in which each node plays the role of the router and host at the same time. MANET has gained increased interest from researchers and developers for various applications such as forest fire detection. Forest fires require continuous monitoring and effective communication, technology, due to the big losses are brought about by this event. As such, disaster response and rescue applications are considered to be a key application of the MANET. This paper gives an extensive review of the modern techniques used in the forest fire detection based on recent MANET routing protocols such as reactive Location-Aided Routing (LAR), proactive Optimized Link State Routing (OLSR) and LAR-Based Reliable Routing Protocol (LARRR)

    Forest Fire Detection Using New Routing Protocol

    Get PDF
    The Mobile Ad-Hoc Network (MANET) has received significant interest from researchers for several applications. In spite of developing and proposing numerous routing protocols for MANET, there are still routing protocols that are too inefficient in terms of sending data and energy consumption, which limits the lifetime of the network for forest fire monitoring. Therefore, this paper presents the development of a Location Aided Routing (LAR) protocol in forest fire detection. The new routing protocol is named the LAR-Based Reliable Routing Protocol (LARRR), which is used to detect a forest fire based on three criteria: the route length between nodes, the temperature sensing, and the number of packets within node buffers (i.e., route busyness). The performance of the LARRR protocol is evaluated by using widely known evaluation measurements, which are the Packet Delivery Ratio (PDR), Energy Consumption (EC), End-to-End Delay (E2E Delay), and Routing Overhead (RO). The simulation results show that the proposed LARRR protocol achieves 70% PDR, 403 joules of EC, 2.733 s of E2E delay, and 43.04 RO. In addition, the performance of the proposed LARRR protocol outperforms its competitors and is able to detect forest fires efficiently

    Novel Smart Fuzzy Controller Based Separation Efficiency Model for Centrifugation

    No full text
    This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexIn biomedical laboratories, to get surely separation efficiency of liquids using currently centrifuge devices, centrifugation process must take not less than 10 minutes at 3000 rpm of sample rotation. An intelligent fuzzy controller for laboratory centrifuge device based on separation efficiency model is produced.  The separation efficiency model is optimizing the time of centrifugation. The new controller programmed with separation efficiency model have many objectives such as high separation efficiency, decrease blood test period, low cost and device power consumption are achieved. In addition, increases the reliability for centrifuge device to estimate the centrifugation period for wide range of predefined separation efficiency, and then, the power consumption of specific separation efficiency for any centrifuge device wattage can be estimate.  The new Fuzzy Logic Controller of centrifuge device has successfully save 18kW.h monthly for 100 daily time device operation

    MANET Routing Protocols Evaluation: AODV, DSR and DSDV Perspective

    No full text
    Mobile Ad Hoc Network (MANET) is a set of mobile nodes that communicate with each other to configure an immediate network without utilizing any of infrastructure, the centralized access point or centralized administration in multiple hop manner. There are a lot of routing protocols have been proposed in MANET which are different from each other in the performance and the mechanism. Therefore, the performance study of those protocols in different scenarios is needed. This paper presents the performance comparison between Dynamic Source Routing (DSR), Ad hoc on demand distance Vector Routing (AODV) as reactive routing protocols and Destination Sequenced Distance Vector (DSDV) as a proactive routing protocol to precisely determine which protocol is more effective. Network Simulator (NS) version 2.35 has used to simulate and evaluate the performance of these protocols in terms of the packet delivery ratio, average throughput, average end-to-end delay, and packet loss ratio with respect to the variable number of nodes

    Performance Analysis of DPSK-OCDMA System for Optical Access Network

    No full text
    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye dia-gram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK

    MANET Routing Protocols Evaluation: AODV, DSR and DSDV Perspective

    No full text
    Mobile Ad Hoc Network (MANET) is a set of mobile nodes that communicate with each other to configure an immediate network without utilizing any of infrastructure, the centralized access point or centralized administration in multiple hop manner. There are a lot of routing protocols have been proposed in MANET which are different from each other in the performance and the mechanism. Therefore, the performance study of those protocols in different scenarios is needed. This paper presents the performance comparison between Dynamic Source Routing (DSR), Ad hoc on demand distance Vector Routing (AODV) as reactive routing protocols and Destination Sequenced Distance Vector (DSDV) as a proactive routing protocol to precisely determine which protocol is more effective. Network Simulator (NS) version 2.35 has used to simulate and evaluate the performance of these protocols in terms of the packet delivery ratio, average throughput, average end-to-end delay, and packet loss ratio with respect to the variable number of nodes

    Design and Implementation of an Embedded Smart Intruder Surveillance System

    No full text
    Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC). Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%

    Design and Implementation of an Embedded Smart Intruder Surveillance System

    No full text
    Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC). Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%
    corecore