البحوث الخاصة بالتدريسي علي عبدالكريم هادي الجبوري

قائمة البحوث
  • عنوان البحث : Effects of connecting a scattered solar generation unit to the grid on the cloud passage using optimization algorithms

    ملخص البحث :

    oday, limitation of fossil fuel resources and other issues such as the possibility of the depletion of fossil energy reserves, global warming, environmental pollution, price instability, and the growing need for industrial and urban centers for energy have prompted the international community to seek appropriate alternatives. Such examples are nuclear energy, solar energy, geothermal energy, wind energy, and ocean waves. Renewable energy is generated owing to the simplicity of the applied technology compared to nuclear energy technologies. On the other hand, such energies play a key role in new energy systems in the world similar to nuclear waste. The increasing use of renewable energies has given rise to significant complications. One of the main operational issues in this regard is the uncertainty of electricity generation by solar power plants, which is caused by the passage of clouds. The present study aimed to investigate the effects of cloud passage on the production of solar power plants. Initially, a control system was designed to control a high-penetration solar power plant in the network, and the maximum allowable percentage of penetration was calculated for different loads. For this purpose, three algorithms (DE, PSO, and ICA) were used to determine the MPPT of the solar arrays in shady conditions, as well as the MPPT point of the solar arrays. According to the results, the colonial competition algorithm was faster compared to the other algorithms.
    • سنة النشر : 2021
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Enhanced Authentication Methods for Access and Control Management in Cloud Computing

    ملخص البحث :

    Abstract: Cloud computing has become a disruptive technology that provides both consumers and organizations with scalable and affordable solutions. But serious security concerns have been brought up by the growing use of cloud services, especially when it comes to access and control management. Conventional authentication techniques, such two-factor authentication and passwords, have shown to be insufficient to protect cloud resources from a constantly changing array of cyberthreats. This study investigates improved authentication techniques created to handle the particular difficulties associated with cloud computing access and control administration. The study looks into a number of methods, such as adaptive access control, biometrics, multi-factor authentication, and behavioral analysis based on machine learning. By making the authentication process more reliable and easier to use, these techniques hope to lower the dangers of data breaches and unauthorized access. Additionally, the study explores how these improved authentication techniques might be used in a cloud computing context while taking data protection laws, scalability, and user friendliness into account. In order to achieve a balance that maximizes security without sacrificing the user experience, the study also looks at the trade-offs between security and user convenience. The results of this study have the potential to greatly help both individuals and businesses that use cloud services by providing enhanced security against unwanted access while preserving a smooth and intuitive user experience. Improved authentication techniques are becoming more and more necessary to guarantee the availability, confidentiality, and integrity of vital data and resources as cloud computing remains an essential component of contemporary IT architecture.
    • سنة النشر : 2023
    • تصنيف البحث : scopus
    • تحميل