Preferred Language
Articles
/
4hYYGYcBVTCNdQwCoDbN
Performance evaluation of the photovoltaic thermal system with a fin array and surface zigzag layout
...Show More Authors
Abstract<p>Solar photovoltaic (PV) has many environmental benefits and it is considered to be a practical alternative to traditional energy generation. The electrical conversion efficiency of such systems is inherently limited due to the relatively high thermal resistance of the PV components. An approach for intensifying electrical and thermal production of air-type photovoltaic thermal (PVT) systems via applying a combination of fins and surface zigzags was proposed in this paper. This research study aims to apply three performance enhancers: case B, including internal fins; case C, back surface zigzags; and case D, combinations of fins and surface zigzags; whereas the baseline smooth duct represents case A. A 2D, steady-state simulation model that took into account the impact of the convective flow of air circulating inside the PVT system in addition to radiative and convective heat losses from the front PV surface was developed and validated via previous tests. The results revealed that, under the same volume requirements, the application of surface zigzags is preferred for airflow rates of 0.06 kg/s or less, whereas the introduction of fins is preferred for higher airflow rates. The results also revealed that, of the three cases considered, the introduction of the fin–surface zigzag combination is the most effective and has the potential to improve the electrical and thermal efficiency by ~26% and 3%, respectively.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Aug 01 2014
Journal Name
International Journal Of Engineering And Innovative Technology (ijeit)
New Predictive Block Matching Searching Algorithms and Hybrid Predictive Search System
...Show More Authors

In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Hijab and Burqa in Islamic Fashion System: فرات جمال حسن العتابي
...Show More Authors

Most of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Plasma Spectroscopy Diagnostics of V2O5 at a Variable of Operating Power and Pressure With Radio Frequency Magnetron Sputtering.
...Show More Authors

   In this paper, we investigate the basic characteristics of "magnetron sputtering plasma" using the target V2O5. The "magnetron sputtering plasma" is produced using "radio frequency (RF)" power supply and Argon gas. The intensity of the light emission from atoms and radicals in the plasma measured by using "optical emission spectrophotometer", and the appeared peaks in all patterns match the standard lines from NIST database and employed are to estimate the plasma parameters, of computes electron temperature and the electrons density. The characteristics of V2O5 sputtering plasma at multiple discharge provisos are studied at the "radio frequency" (RF) power ranging from 75 - 150 Wat

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 10 2023
Journal Name
Aspac J. Mol. Biol. Biotechnol
Influence of IL-28B serum level and gene polymorphism in a sample of Iraqi patients with ankylosing spondylitis
...Show More Authors

Ankylosing spondylitis (AS) represents one kind of advanced arthritis formed via inflammatory stimuli long-term in the spin‘s joints. Interleukin (IL)-29 (interferon- lambda1(IFN- λ1)), interleukin (IL)-28A (interferon- lambda 2 (IFN- λ2)) and interleukin (IL)-28B (interferon- lambda 3(IFN-λ3)) are three interferon lambda (IFN- λs) molecules that have recently been identified as new members of the IFN family. IL-28B expression in ankylosing spondylitis (AS) is not well understood. 150 male healthy controls ((HC) and 160 males with AS as patients group participated in this study. Serum level and gene polymorphism were assessed using an enzyme-linked immunosorbent assay and Sanger sequencing for IL-28B, respectively. The results showed

... Show More
Publication Date
Sat Jan 31 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of tongue space area in a sample of Iraqi adults with class I dental and skeletal pattern
...Show More Authors

Background: Lateral cephalometric radiography is commonly used as a standard tool in orthodontic assessment and treatment planning. This study aimed to determine the tongue and surrounding space area in a sample of Iraqi adults with class I dental and skeletal pattern. Materials and methods: The study included thirty healthy subjects (15 males and 15 females) with an age ranged between 23-34 years and class I dental and skeletal pattern with no history of any sleep related disorders. The assessed cephalometric measurement included length and height of the tongue and position of hyoid bone from cervical line. Descriptive statistics were obtained for the data. Genders difference was evaluated by independent sample t-test. Results: There wer

... Show More
View Publication Preview PDF