Preferred Language
Articles
/
alkej-165
Study on the Effect of the Curvature of Solar Collector on Wind Loading Coefficients and Dynamic Response of Solar Collector
...Show More Authors

In the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found that the change in collector curvature (focal length) lead to remarkable changes in wind loading coefficients (drag, lift, and moment), dynamic response (displacement) and natural frequencies but does not affect the first mode shape. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Social responsibility for tourism companies and its reflection on strategic reputation
...Show More Authors

Scopus
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEASONAL CHANGES ON EPIDIDYMAL HISTOLOGY AND TESTOSTERONE RECEPTORS IN IRAQI DOGS
...Show More Authors

    The present study was carried out on forty eight epididymis of sexually mature dogs to elucidate light microscope features and the presence of testosterone receptors inside epididymis in different seasons. Twenty four dogs aged 3 years were used during the periods from 1/2/2015-1/2/2016. The epididymis were carefully dissected from the testis after orchidectomy operations and fixed, dehydrated, clarified and embedded in paraffin. Sections were stained with hematoxylin and eosin and periodic acid schiff. As well as, paraffin embedded cytoimmunochemistry technique was used for detection of testosterone receptors. Muscular coats showed no significant differences during different seasons or among segments. Epithelial heigh

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 06 2024
Journal Name
الذكوات البيض
Self-criticism in Quranic models and its impact on building them
...Show More Authors

Self-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t

... Show More
Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Green Engineering
Sustainability and recovery project management implementation on construction projects in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref