Been using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar panel in this range of fixed angles about5.6 kw.h/m2 yearl.
Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreTechnologies of the theatre show elements get great transferring concerning the creative embodiment of its aesthetic elements including its raws, forms, parts and masses in an attempt to achieve the prin cipal expressive progress to embody the main theme of the idea and the intended subject .
This is within the criterion of supporting the way to deal with technologies (décor elements , lighting music tones vocal affects , fashion and makeup) that achieving the emagintional appropriate atmosbheres which the writer and the director of the theatre show aim to make it present and succeed by furming active participation tunches of the ability of the cinogra . phic – element dsigners in order to invlve the theatre space atmospheres in cl
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis research a mining at evaluation the efficiency of the nursing performance depended on standards of W.H.O. via application standards of W.H.O on the nursing personnel in medical city office, in light of it, it has design world evaluation list, and a sample was chosen from the nursing personnel in given researched the organization whom they are evaluated according to the standards of W.H.O for the nursing performance included of ten standards, divided in to 45 question , besides the evaluation list, the researcher get assistance of some tools of collection information via actual checking and personal interviews, a number of statistical means were used to manipulate t
... Show MoreBackground: habit is any purposeless action repeated unconsciously. It is a sign of lack of harmony between the subject and the surrounding environment. Deleterious oral habits such as finger sucking could be one of the etiological factors for altered oro-facial growth development. This study conducted to explore the association between finger sucking habit and malocclusion in deciduous dentition. Materials and method: Totally 40 chronic thumb sucker and 40 controls matching in age and gender were enrolled in the study. A study conducted by verifying different occlusal trait through the intra-oral examination. Thumb sucking habit diagnosed using data gathered from parents. Results: The statistical analysis showed a highly significant dif
... Show MoreThe interaction in the city is reflected in the movement of people motivated by their activities and their economic and social goals, which include many variables subject to the planning process in the interpretation of this movement and the mapping of trends of transport intensity through the concept of transport function and its functional relationships with the uses of the earth in the sustainability and effectiveness of the movement of transport and Economic activity and population movement. Transport planners are concerned with the requirements of land use, which are linked to and included in the transport planning process as a factor for the future transport needs. There is a strong relationship between the transport system
... Show More