Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect on enhancing output power. It revealed that a small compact design with the use of magnetic, gravity, and centrifugal forces as excitation elements and a fixed piezoelectric to avoid a slip ring had a good influence on output power optimisation. One of the interesting designs that future works should focus on is using gear for frequency up-conversion to enhance output power density and keep the design simple and compact.
Artificial intelligence (AI) offers significant benefits to biomedical research and academic writing. Nevertheless, using AI-powered writing aid tools has prompted worries about excessive dependence on these tools and their possible influence on writing proficiency. The current study aimed to explore the academic staff’s perspectives on the impact of AI on academic writing. This qualitative study incorporated in-person interviews with academic faculty members. The interviews were conducted in a semi-structured manner, using a predetermined interview guide consisting of open-ended questions. The interviews were done in person with the participants from May to November 2023. The data was analyzed using thematic analysis. Ten academics aged
... Show MoreThe effect of water stress induced by using polyethylene glycol (PEG-6000) on germination of seeds and growth of seedlings of Silybum marianum was studied. Two concentrations of PEG were used to get two water stresses (-0.4 & -0.8 bar) as well as the control for comparison. The results showed a significant decrease (P<0.05) in germination ratio compared with the control. The ratio did not slow down to less than 50% which indicates the ability of the seeds to resist water stress to some extent. Also, a significant decrease (P<0.05) in the length of shoot and root was observed compared with the control. This plant showed
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative