Preferred Language
Articles
/
8xc9kJMBVTCNdQwCe9Vv
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical. RF powered devices including sensor nods can be used potentially in ultra-low-power areas to extend the life battery span [4]. Moreover, modern biomedical implantable devices require power source channels for charging to prolong the lifetime of the implanted device and reduce the chances of battery replacements [5]. Furthermore, the ambient electromagnetic energy recycling possibility in dense urban zones population was significantly explored in [6]. Therefore, power conversion circuits to extract enough DC power from the incident electromagnetic waves for passive devices become urgent demand [7]. RF energy harvesters, generally, are consistent with an antenna, a power management circuit, and a rectifier [3]. The antenna part is the responsible element for collecting the RF energy from radiating sources. The appropriate antenna design is the one with a wide bandwidth of omnidirectional radiation patterns to collect the energy from a different direction at any frequency [8].

Scopus Crossref
View Publication
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Modeling and Simulation of Cadmium Removal from the Groundwater by Permeable Reactive Barrier Technology
...Show More Authors

The removal of cadmium ions from simulated groundwater by zeolite permeable reactive barrier was investigated. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. Many operating parameters such as contact time, initial pH of solution, initial concentration, resin dosage and agitation speed were investigated. The best values of these parameters that will achieved removal efficiency of cadmium (=99.5%) were 60 min, 6.5, 50 mg/L, 0.25 g/100 ml and 270 rpm respectively. A 1D explicit finite difference model has been developed to describe pollutant transport within a groundwater taking the pollutant sorption on the permeable reactive barrier (PRB), which i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of using blockchain technology in improving the quality of digital financial reports
...Show More Authors

This study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.

The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Employment aesthetic of digital technology for color in the film novelist: نجيـــــب أصليـــــوة حيــــــــــــــدو
...Show More Authors

Find all boils down to is marked with (recruitment aesthetic of digital technology for (color) in the film novelist) And the relationship between the aesthetic employment of digital technology for (color) and its impacts on the level of artistic creativity through digital technology and its impacts on the technical and completed the final film in the film.Search and distributed at five chapters The first chapter discusses the methodological framework of the research, which included the research problem and is as follows:What is the digital technology to enrich color in the context in the film narrative to reflect the dramatic effect?And the importance of research and its objectives, including:1 - Employment aesthetic of digital technolog

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Comparison the Physical and Mechanical Properties of Composite Materials (Al /SiC and Al/ B4C) Produced by Powder Technology
...Show More Authors

In this investigation, metal matrix composites (MMCs) were manufactured by using powder technology. Aluminum 6061 is reinforced with two different ceramics particles (SiC and B4C) with different volume fractions as (3, 6, 9 and 12 wt. %). The most important applications of particulate reinforcement of aluminum matrix are: Pistons, Connecting rods etc. The specimens were prepared by using aluminum powder with 150 µm in particle size and SiC, B4C powder with 200 µm in particle size. The chosen powders were mixed by using planetary mixing setup at 250 rpm for 4hr.with zinc stearate as an activator material in steel ball milling. After mixing process the powders were compacted by hydraulic

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Risk-Based Inspection Due to Corrosion Consequences for Oil and Gas Flowline: A Review
...Show More Authors

   The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 27 2019
Journal Name
Molecular Crystals And Liquid Cryst
A New Series of Triazine-core Based Mesogenic Derivatives: Synthesis, Characterization and Mesomorphic Study
...Show More Authors

The synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.

Scopus (10)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref