Preferred Language
Articles
/
Kxfcbo8BVTCNdQwCwHjL
The Effect of Solar Panel Type on some Irrigation System Parameters and Bean Crop Germination Percentage
...Show More Authors
Abstract<p>An experiment was carried out at Al-Raed Research Station, which is located on the Baghdad-Anbar road during the winter season, in order to study the effect of the type of solar panels and irrigation system on some performance indicators of irrigation systems and germination percentage of bean crop (Vicia Faba L). A randomized complete block design (RCBD) was used with three replications. The experiment consist of two factors. 1st factor was the solar panel type with two levels : monocrystalline and polycrystalline. Second factor was the irrigation system with two levels Drip and sprinkler irrigation system the following indicators were studied : solar panel efficiency (%), Irrigation system capacity (L / H), coefficient of homogeneity, germination percentage (%). The results shows that the monocrystalline achieved the best result by achieving the highest solar panel efficiency (24.21 %), the highest irrigation capacity (1782 L/H) and highest coefficient of homogeneity (94.54 %), The best solar panel efficiency was achieved with the drip irrigation which has on average (22.50 %), The drip irrigation had the highest coefficient of homogeneity (96.14 %) and the best germination percentage (97.20 %). The interaction between solar panel type and irrigation system shows that the monocrystalline with drip irrigation achieved the best panel efficiency (25.69 %) and highest average for homogeneity (96.72 %).</p>
Scopus Crossref
View Publication
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Effect of the Thickness and Annealing Temperature on the Structural Properties of Thin CdS Films Prepared by Thermal Evaporation
...Show More Authors

A thin CdS Films have been evaporated by thermal evaporation technique with different thicknesses (500, 1000, 1500 and 2000Å) and different duration times of annealing (60, 120 180 minutes) under 573 K annealing temperature, the vacuum was about 8 × 10-5 mbar and substrate temperature was 423 K. The structural properties of the films have been studied by X- ray diffraction technique (XRD). The crystal growth became stronger and more oriented as the film thickness (T) and duration time of annealing ( Ta) increases.

View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Resin Infiltration and Microabrasion on the Microhardness of the Artificial White Spot Lesions (An in Vitro Study)
...Show More Authors

Crossref (7)
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Resin Infiltration and Microabrasion on the Microhardness of the Artificial White Spot Lesions (An in Vitro Study)
...Show More Authors

Background: White spot lesion is the first visible sign of dental caries that is characterized by demineralized lesion underneath an intact surface. Several studies demonstrated that they could be treated using noninvasive techniques like the use of fluoride or casein phospho-peptide and amorphous calcium phosphate. Improvement in aesthetic outcomes by covering the demineralized enamel is one of the advantages of the use of resin infiltration and opal-ustre microabrasion, which are two new techniques that had been used for treatment of white spot lesion. The purpose of this study was to evaluate the impact of resin infiltration and microabrasion in the microhardness of the artificial white spot lesions at various depths. Material and method

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of Molecular Imprinting on the Loading and Release of Poorly Water Soluble Drug in Hydrogel Gontact Lenses
...Show More Authors

Therapeutic contact lenses TCLs is an approach used to enhance corneal residence time and reduce frequent instillation, which is a problem with eye drops.  The problem with CLs is loading of hydrophobic drugs. In this research the CLs were prepared with molecular imprinting MI to enhance the loading of itraconazole, which is used as antifungal drug for fungal keratitis. CLs using different  concentration of hydroxyethyl methacrylate HEMA and methacrylic acid MAA were prepared with and without MI using PEGDA (25 μL) and AIBN (37 mg) as crosslinker and initiator respectively. All the prepared CLs were clear and have good folding endurance. MICLs had significantly higher drug loading compared to conventional CLs. The release of i

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Advances In Mechanical Engineering
3D-shape formation of blood vessels based on computer aided design system
...Show More Authors

This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus