Preferred Language
Articles
/
8xc9kJMBVTCNdQwCe9Vv
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical. RF powered devices including sensor nods can be used potentially in ultra-low-power areas to extend the life battery span [4]. Moreover, modern biomedical implantable devices require power source channels for charging to prolong the lifetime of the implanted device and reduce the chances of battery replacements [5]. Furthermore, the ambient electromagnetic energy recycling possibility in dense urban zones population was significantly explored in [6]. Therefore, power conversion circuits to extract enough DC power from the incident electromagnetic waves for passive devices become urgent demand [7]. RF energy harvesters, generally, are consistent with an antenna, a power management circuit, and a rectifier [3]. The antenna part is the responsible element for collecting the RF energy from radiating sources. The appropriate antenna design is the one with a wide bandwidth of omnidirectional radiation patterns to collect the energy from a different direction at any frequency [8].

Scopus Crossref
View Publication
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Social Graphic Design and its Reflection in Combating Drug Abuse: محمد عباس مظهر الزيدي
...Show More Authors

Social graphic design is the design that realizes the role and responsibility of the designer in society, and the use of graphic design in bringing about social change, especially as it is a professional contribution that plays an important role in the behavioral development of societies, and through the above, the researcher found a logical justification for his research problem, which is summarized by the following question: (What is the concept of Social Graphic Design and its implications in the fight against drug abuse)
While the two objectives of the research were identified in defining the social graphic design and its effect on combating drug abuse, and the theoretical framework was divided into two topics, the first study dea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis, Characterization and Comparative Cytotoxic Evaluation of bis-(2- mercaptoacetate) gold (III) chloride
...Show More Authors

In recent years , the interest in gold (III) species have gained more and more attention for cancer chemotherapy , this was stimulating by the possibility to develop new agents with mode of action and clinical profile different from the established platinum metalodrugs.

With this frame, recently new square planar Au(III)  complexes (Au(L)(L')n); where L=SCH2COO- ; L'=HSCH2COO- had been synthesized with S/O – donor ligands.

In this article and by the aim to replace, one of (L') ligand by anion chloride ligand (which supposedly more relevant for the biodistribution of the compound than for its pharmacodynamic effects), new complex (Au(L')

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Floors and transparent role in the design studios satellite channels: وسام صالح حمد
...Show More Authors

The search (floors and transparent role in the design studios satellite channels) and presented as a study-oriented, and the research aims to identify the role of flooring transparent spaces studios satellite channels and side performative and aesthetic, and formulas design to highlight the role floors transparent spaces studios satellite channels. And highlight the importance of research, particularly in its contribution to the clarification of the concept of the relationship between transparency and performing aesthetic treatments for floors by clarifying its role in the designs of the internal spaces of the studios, as well as his contribution to the founding of the theory of looking at the base of such concepts. To achieve the object

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Propulsion And Power Research
Heat transfer enhancement from heat sources using optimal design of combined fins heat-sinks
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Construction Engineering And Management
Integrating Worker Health and Safety into Sustainable Design and Construction: Designer and Constructor Perspectives
...Show More Authors

View Publication
Scopus (78)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Histological and Physiological Studies on the Long-term Effect of Different Concentrations of Energy Drink (Tiger) on the Renal and Hepatic Systems of Young Mice
...Show More Authors

The present study aims to investigate the long-term histopathological, and physiological effects of different concentrations of a commercially available energy drink (Tiger) on liver and kidney of young mice. Sixteen Balb/c male mice,6 -week old, were divided into 4 groups (n=4). Two groups consumed the energy drink at a concentration of 28µl energy drink/ml water. One group were killed after 10 days (T1), another group were killed after 20 days (T2). Other group of mice consumed the energy drink at a final concentration of 14µl/ml for 20 days (T3). The last group was provided only with water and served as control. Mice of all groups drank around 3 ml per day. The histopathological study on liver of treated groups showed many changes s

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Electronics
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More