Abstract In this study, an investigation is conducted to realise the possibility of organic materials use in radio frequency (RF) electronics for RF-energy harvesting. Iraqi palm tree remnants mixed with nickel oxide nanoparticles hosted in polyethylene, INP substrates, is proposed for this study. Moreover, a metamaterial (MTM) antenna is printed on the created INP substrate of 0.8 mm thickness using silver nanoparticles conductive ink. The fabricated antenna performances are instigated numerically than validated experimentally in terms of S11 spectra and radiation patterns. It is found that the proposed antenna shows an ultra-wide band matching bandwidth to cover the frequencies from 2.4 to 10 GHz with bore-sight gain variation from 2.2 to 3.43 dBi at maximum. The antenna size is compacted to a 32 mm × 24 mm using a fractal-shaped MTM when mounted on the INP substrate with a relative permittivity ɛr = 3.106−j0.0314 and a relative permeability µr = 1.548−j0.0907. Finally, the maximum obtained voltage from the proposed antenna is found about 2 V at 2.45 GHz and 2.5 V at 5.8 GHz, where, the corresponding measured equivalent isotropic radiated power is about 2.35 W at 2.45 GHz and 6.12 W at 5.8 GHz.
A field study was conducted at the college of Agriculture, Baghdad University-Jadiriyah to investigate the effect of adding potassium fertilizer and organic nutrient (Reef Amirich) on the population density of two sucking pests of cucumber, cotton whitefly, Bemisia tabaci and onion thrips, Thrips tabaci during the spring season/2016. Results indicated that potassium sulphate (50, 100 and 150 kg/ha) and organic nutrient (0.8 and 1.6ml/l) reduced both the population density of B. tabaci and T. tabaci nymphs depending on the fertilizer level of the user, the treatment 150 kg/ha for the potassium fertilizer and 1.6 ml/L for organic nutrient was the highest among others when minimized density of nymphs by 1.62 nymphs of B. tabaci/disk leaf and 0
... Show MoreThis aims tackles the importance of the organizational energy of the hotel organizations that search the success in the business field to penetrate in the whole tourist markets, and to draw the policies and firm rules which must be framed with the administrative strategies that contributed in creativity and achievement the targets besides provide a future vision due to its position among the competitive henceforth achieving the activity. This is what the chapters tackle in the theoretical side. Also many general questions have been arisen to determinate the importance of the research and many other special questions that express the problem of the study. To limit the levels of study alter
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreRock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters
... Show MoreThe physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wi
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More