The systems cooling hybrid solar uses solar collector to convert solar energy into the source of heat for roasting Refrigerant outside of the compressor and this process helps in the transformation of Refrigerant from the gas to a liquid state in two-thirds the top of the condenser instead of two-thirds the bottom of the condenser as in Conventional cooling systems and this in turn reduces the energy necessary to lead the process of cooling. The system cooling hybrid use with a capacity of 1 ton and Refrigerant type R22 and the value of current drawn by the system limits (3.9-4.2A), the same value of electric current calculated by the system are Conventional within this atmosphere of Iraq, and after taking different readings of the temperatures and pressure to several points in the system's found that the Refrigerant when it comes out of the compressor, it loses part of the temperature of the water in the solar collector through a heat exchanger while the literature published in accordance with the manufacturers that the solar collector, a kind of vacuum tubes contributes to raise the pressure and temperature of the fluid cooler to reduce the consumption of energy spent on compressor. Therefore, the system described by the current not fit for domestic use within the Iraqi environmental conditions.
Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreSummaryBackground: Rotavirus infection is the most commoncause of watery viral diarrhea in children younger than 5 years of age; it is a major cause of childhood morbidity and mortality.Objective:The aim of the study is todetermine the clinical picture, age distribution of patients with rotavirus infection and their maternal educational background.Patients &methods: A total of 202 patients suffering from diarrhea were included in this study, over 6 months period( from 1stof March 2011to 30th of August 2011),in Children Welfare Teaching hospital. History and physical examinationwere carried out, anthropometrics measures were done and plotted on Centers for Disease Control& World Health Organization charts to determine the nut
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreImage Fusion Using A Convolutional Neural Network
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.