Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical. RF powered devices including sensor nods can be used potentially in ultra-low-power areas to extend the life battery span [4]. Moreover, modern biomedical implantable devices require power source channels for charging to prolong the lifetime of the implanted device and reduce the chances of battery replacements [5]. Furthermore, the ambient electromagnetic energy recycling possibility in dense urban zones population was significantly explored in [6]. Therefore, power conversion circuits to extract enough DC power from the incident electromagnetic waves for passive devices become urgent demand [7]. RF energy harvesters, generally, are consistent with an antenna, a power management circuit, and a rectifier [3]. The antenna part is the responsible element for collecting the RF energy from radiating sources. The appropriate antenna design is the one with a wide bandwidth of omnidirectional radiation patterns to collect the energy from a different direction at any frequency [8].
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show Morethe electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
The state did not witness the emergence of independent bodies because of the nature of the ruling regimes that were characterized by political tyranny represented by the king at the time, as is the case with Greece and the Greeks and Persia and the Romans and others. As for the Islamic state, which emerged later, it saw the emergence of what looks like independent bodies that we see today, There was the so-called Diwan Al-Hesba and the Ombudsman's Office as an independent body from the Islamic State, which operated independently to support the oppressed and the equitable distribution of financial resources, even though it was headed by well-known governors of justice and honesty. A state in the modern era, many countries, especially in E
... Show MoreThe developments in forensic DNA technology have led us to perform this study in Iraqi population as reference database of autosomal Short Tandem Repeat (aSTR) DNA markers . A total of 120 unrelated individuals from Wasit province were analyzed at 15 STR DNA markers. Allele frequencies of DNA typing loci included in the AmpFlSTR1 IdentifilerTM PCR Amplification Kit panel from Applied Biosystems (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) and several forensic efficiency statistical parameters were estimated from all the sample. the combined Matching Probability (CMP) using the 15 STR genetic loci in Iraqi population was estimated at 1 in 2.08286E-18 and the Combined
... Show Moreيمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،
... Show MoreThe increasing requirement and use of dental implant treatments has rendered dental implantology indispensable in dentistry. The aim of this study is to determine the optimum concentration of calcium silicate to be incorporated into a polyetherketoneketone (PEKK) matrix used as an implant material to enhance the bioactivity and mechanical properties of the composite compared with unmodified PEKK. In this study, different weight percentage (wt%) of micro-calcium silicate (m-CS) is incorporated into PEKK with ethanol as a binder. Subsequently, the mixture is dried in a forced convection oven at 120°C and poured into customized molds to fabricate a bioactive composite via compression molding (310°C, 15 MPa, and 20 min holding time
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MorePolymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter