Preferred Language
Articles
/
cBf-oo4BVTCNdQwC5Fab
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations, if the summer season witnesses it. The Iraqis have a major interruption of electrical power, which forces them to buy electricity from the owners of private generators, and they are subject to their implementation and exploitation. Prices per ampere, as the price of an ampere in hot summer reaches $20, according to their desires, in addition to the environmental pollution left by those generators, as they are usually in residential neighborhoods and near homes, which increases From pollution of fresh air and the environment in residential neighborhoods, and this is what necessitated the aim of this study to find realistic solutions that are in line with the current situation that wounded Iraq is living, as it possesses enormous natural resources, and praise be to God, Lord of the Worlds. Despite all this, Iraq provides energy to most countries, and it suffers from severe power outages. Our study aims to find other alternatives to obtain renewable energy. By building more solar panels and wind turbines to play a decisive role in achieving this goal, which is to provide clean energy, especially since the climate of the Middle East in general and Iraq in particular has solar energy available throughout the year, especially in the hot summer season, and by using artificial intelligence it may be possible to store that energy and save it when needed.

Crossref
View Publication
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
The Optimum Conditions for Naphthalene Biodegradation by Filamentous Fungi
...Show More Authors

Recent studies have proved the important role of fungi in the biodegradation of oil pollutants. The present study aims to find the optimal conditions for the fungi to get the best rate of the biodegradation of the polycyclic aromatic hydrocarbon (PAHs) (Naphthalene) compounds. Soil samples were taken from 18 different sites polluted with oil wastes and cultured then obtained 312 isolated fungi from 64 replicates Primarily screening were done on fungal isolates on solid media containing naphthalene the results revealed that 25 fungal isolates gave good growth, 47 fungal isolates gave Moderate growth, 66 gave weak growth and 147 fungal isolates gave no growth on Naphthalene solid media.
Then secondary screening were done on 25 fungal is

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Improvement of Diesel Fuel Engine Performance by Nanoparticles Additives
...Show More Authors

This study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar performance,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Biotechnology
Identification of Leishmania donovani Isolates by Polymerase Chain Reaction
...Show More Authors

Leishmaniasis is endemic ofIraq in both cutaneous and visceral form. The available tools for diagnosis and detection of Leishmaniaare nonspecific and may interfere with other species. In this study, Polymerase Chain Reaction (PCR) has been used to identify Iraqi isolate of visceral leishmaniasis (MHOM/ IQ/2005/MRU15) which a previously diagnosed by classical serological tests. PCR amplificationwas carried out using species-specific primers of Leishmania donovani. Four primer pairs of mini-circle DNA and ITS-1 were used.13A/13B, which is used to identify Leishmaniaas a genus, NM12, LITSR/L5.8S and BHUL18S, were used to detect the sub species of L. donovani.The result ofPCR

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Dewatering of Kerosene using Hydrocyclone
...Show More Authors

Water/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF