Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
Diagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe management of the exchange rate of the most important tools of economic policy because of its wide area in achieving stability and economic growth through the provision of stability in the exchange rate of the currency of the country concerned , as well as the impact and influence of money supply and then treat the economic crisis monetary and reduce the risk of currency exchange rate .For the management of the exchange rate in Iraq has passed through several stages , from installation to link to a basket of currencies to float freely , and we are dealing with in this research regard to the achievements of monetary policy , especially after the enjoyment of independence on according to the Iraqi Central Bank Law No. 56 of 2004 and Ma
... Show MoreThe current paper was designed to find the possible synergic effect of EBV infection with the HPV-16 in Iraqi women suffering from cervical carcinoma. This retrospective study involved paraffinized blocks of two groups. The research included 30 carcinomatous cervical tissues and 15 samples from normal cervical biopsies. After sectioning using positively charged slides, immunohistochemistry (IHC) was performed to detect anti-Epstein Barr Virus LMP1 and Human papillomavirus type 16 primary antibodies. Sixty-three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant association (p = 0). The co-infection of the EBV and H
... Show Morebjective researcher through this research to Put a theoretical framework to strategic orientation the center on the market in the business and the diagnosis and interpretation of the nature of the link between relationships and influencing strategic orientation dimensions Almtmthelh organizations (Entrepreneurial Orientation, market Orientation, Interaction Orientation) and the performance of the Iraqi Private Banks The research community and the level of dimensional and through the use of scale (Balanced Scorecard) Bmnzawradtha the four, the test of this research in the Iraqi banking sector (Gulf Commercial Bank
... Show More