One of the most important problems facing the world today is the energy problem. The solution was in finding renewable energy sources such as solar energy. The solar energy applications in Iraq is facing many problems . One of the most important problems is the accumulation of dust on the solar panels surface which causes decreasing its performance sharply. In the present work, a new technique was presented by using two-axis solar tracking system to reduce the accumulated dust on the solar panel surface and compared it with the fixed solar panels which installed at tilt angles 30° and 45°. The results indicated that the maximum losses of the output power due to accumulation of dust on the fixed solar panels is about 31.4% and 23.1% res
... Show MoreThe virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreObjectives The strategies of tissue-engineering led to the development of living cell-based therapies to repair lost or damaged tissues, including periodontal ligament and to construct biohybrid implant. This work aimed to isolate human periodontal ligament stem cells (hPDLSCs) and implant them on fabricated polycaprolactone (PCL) for the regeneration of natural periodontal ligament (PDL) tissues. Methods hPDLSCs were harvested from extracted human premolars, cultured, and expanded to obtain PDL cells. A PDL-specific marker (periostin) was detected using an immunofluorescent assay. Electrospinning was applied to fabricate PCL at three concentrations (13%, 16%, and 20% weight/volume) in two forms, which were examined through field emission
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreThe Present study aims to investigate the attitude toward extremism of the university student and to find differences with three variables, gender field of study ,grade), For the purposes of the study on(3) level scale of the attitude towards extremism , and subjected to validity and credibility ,the scale was designed for ( 590) students sample (237) males ,and (357) females Results shown that students has a mild attitude towards extremism compared with the average of the scale attitude towards Religious extremism occupied the number one level ,followed by social extremism and lastly political extremism in Results also shown different in gender (males ,females) with the males having the granter attitude towards extremism as for the othe
... Show MoreIn this study serum total sailie acid concentration were tested as a scrological marker of discases activity to cvalute the result of the test in the diagonosis oe enteric fever(TSA) was measured in the serum od (50) patines with typhi fever(50)pa-tients
The Present study aims to shed some light on the concept of authority of university students and to find statistically significant differences as regards this concepts in accordance with three variables gender (males, females),field of study(scientific ,humanities)and grade(second ,fourth). To accomplish the study a ( 7) level scale was developed for the concept of authority and it subjected to validity and credibility the scale was used with 590 student sample (237) males and (353) females Results show that male students show obedience to authority forms below the Avery e component with the theoretical Avery of the scale besides ,reinforcement was on the top of authority chain ,followed by person traits ,friends, affect punishment and t
... Show More