Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreNew complcxcof Cu (ll),Ni(ll) ,Co(ll), and Zn(ll) wi th 2- amino-5-p-Fiouro Phenyl 1,3,4-Thiadiazole have been synthesized . The products were isolated , studied and characterized by physical measurements, i.e., (Ff -IR) ,UV-Vis and the melting points were determined .The new Schiff base (L) has been used to prepare some complexes .The prepared complexes were identified and their tructural geometry were suggested.
New complexes of Cu (ll), Ni (ll), Co (ll), and Zn (ll) wi th 2-amino-5-p-Fiouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(Ff-IR), UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested
The results of this study showed that the tongue of the adult Iraqi domestic cat is divided into three regions of apex, body and root. The dorsal surface of all regions possesses five types of lingual papillae, two mechanical which are filiform and cylindrical papillae, while the other three types are taste papillae which are foliate, fungiform and circumvallate papillae, while these papillae are absent on its ventral surface. The histological examination of all tongue areas revealed that it consisted of three tunica, the tunica mucosa and the tunica submucosa (the lamina propria) and the tunica muscularis. The tunica mucosa consisted of the epithelial lining, which is a stratified squamous epithelial tissue covering the lingual papillae, a
... Show MoreMefenamic acid belongs to non-steroidal anti-inflammatory drugs that are used widely for the treatment of analgesia. Our aim from this study is to establish a new assay for the quantitative determination of mefenamic acid (MFA) in the pharmaceutical sample by two sensitive and rapid flow injection-fluorometric methods. A homemade fluorometer was used in fluorescence measurements, which using solid-state laser diode 405 and 532 nm as a source, combined with a continuous flow injection technique. The first method depends on the effect of MFA on calcein blue (CLB) fluorescence at 405 nm. Another method is a study of rhodamine-6G (Rh-6G) fluorescence after adding MFA, and recording at 532 nm. Optimum parameters as fluorescent dye concen
... Show More