One of the most demanded studies is wind turbine site assessment. It is difficult to build a simulation program because of the many variables that affect the wind speed and direction. The procedure of this research depend on two approaches, the Wind Atlas Analysis model and the Inverse Distance Wait interpolation. These procedures give the estimated annual energy production for each turbine (V82) with 82m blades diameter at 70m hub heights. The output at this location for each turbine is about (4.3 GWh). The studied area is about 20x20km2 and could be plant at least 600 turbine and have about 2500 GWh of annual energy production.
In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter
Undesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More