Been using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar panel in this range of fixed angles about5.6 kw.h/m2 yearl.
Social marketing seeks to develop and integrate marketing concepts with other approaches to social change and aims to influence behaviors that benefit individuals and societies for the social good. The study investigates the type and level of influence of social marketing on customer behavior in tourism companies in Baghdad (Iraq). The sample size of the study is 135 people comprising directors, assistant directors, and marketing staff in tourism companies in Baghdad. A questionnaire was used as a tool to collect data and information, and was prepared by the researcher after it underwent validity, stability, and arbitration tests. The data was analyzed using the statistical program (SPSS v. 25, AMOS v. 23) and statistical methods have been
... Show MoreThe Current status of biomedical waste of solid, liquid and gaseous formulations from medical and educational laboratories in Iraqi universities and research centers was assessed using a well-structured questionnaire. The questionnaire was distributed to scientists, researchers, medical technicians and graduate students who are directly involved in laboratoiy daily activities. The responses were analyzed statistically and interpreted accordingly. The results showed diat the frequency of questionnaire respondent's affiliation gave the highest percentage frequency (69.4%) with the questionnaire of Technical Medical Institute/Al-Mansour while constitute die responses of the Dnig Control Department/Ministry of Sciences and Technology gave the l
... Show MoreThe investment portfolio of financial instruments & banking relatively new in the banking sector & the world of investment &capital markets in spite of its importance & its advantages in terms of the nature of the diversity of investment instruments as well as reduce the risk of investment & its contribution to the revitalization of the banks & the financial market , economic, &characterized by developments accelerated under information & communications technology , as is the portfolio tool vehicle of investment tools that provide for people who want to invest & they can not manag
... Show MoreNA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13
The present study is considered the first on this sector of the Tigris River after 2003. It is designed for two aims, the first is to demonstrate the seasonal variations in physicochemical parameters of Tharthar-Tigris Canal and Tigris River; the second is to explain the possible effects of canal on some environmental properties in the Tigris River. Water samples were being collected monthly. Six sampling sites were selected, two on Tharthar Canal and four along the Tigris River, one before the confluence as a control site and the others downstream the confluence with the canal. For a period from January to December 2020, nineteen physicochemical parameters were investigated including air and water temperature, turbidity, electrical cond
... Show MoreBackground: Young children’s oral health maintenance and outcomes are influenced by their parent’s knowledge and beliefs, which affect oral hygiene and healthy eating habits. This study aims at assessing caries risk in children aged 6 months to 6 years attending the Specialized Center of Preventive and Pediatric Dentistry Center at Al-Resafa sector in Baghdad. Materials and Methods: A cross-sectional study was conducted from 15 May – 15 June 2018, all children attended the center (80 children) were assessed by using the standard caries risk assessment tool of the American Academy of Pediatric Dentistry (AAPD). Results: The highest percentage of children was as follows: no fluoride exposure 44(55%), did not brush 46(5
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More