Preferred Language
Articles
/
joe-1146
Experimental Evaluation of Evaporative Cooling for Enhancing Photovoltaic Panels Efficiency Using Underground Water
...Show More Authors

This paper presents an experimental study of cooling photovoltaic (PV) panels using evaporative cooling. Underground (geothermal energy) water used to extract heat from it during cooling and cleaning of PV panels. An experimental test rig was constructed and tested under hot and dusty climate conditions in Baghdad. An active cooling system was used with auxiliary an underground water tank to provide cold water as a coolant over both PV surfaces to reduce its temperature. The cellulose pad has been arranged on the back surface and sprays cooling on the front side. Two identical PV panels modules used: without cooling and evaporative water cooling. The experiments are comprised of four cases: Case (I): backside cooling, Case (II): front and back cooling (pump supply water every 35 minutes), Case (III): cooling both sides using Arduino controller. Water cooling pump operation depending on the panel temperatures (temperature sensors were installed on the front of the panel), Case (IV): Repeating case III with different water flow rates. Experimental results showed that the average reduction in module temperatures was 4, 8,12.2 and 12.6 ⁰C respectively by Case (I), (II), (III) and (IV) with respect to a non-cooling module. Using evaporative water cooling achieved a total improvement of 1.74%, 2.8%, 15.8%, and 16% in the conversion efficiency of the panel by the Case (I), (II), (III) and (IV) respectively when compared to a non-cooling module.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Quest for an Ideal Beauty in Toni Morrison's The Bluest Eye
...Show More Authors


In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.


View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Modern Applied Science
A New Method for Detecting Cerebral Tissues Abnormality in Magnetic Resonance Images
...Show More Authors

We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St

... Show More
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Authorities and Procedures for Detecting Financial Violations : A Study in French Legislation
...Show More Authors

France attached great importance to public funds Article 15 of the Declaration on Human and Citizen's Rights (DDHC) stipulates that society has the right to hold any public official accountable for his or her administration. For that reason, the French legislature has established a body specialized in the control of public funds, which it calls the Court of Accounting. It has established the Court of Budget and Financial Discipline to assist it. The courts are run by judges who cannot be dismissed. The courts are also given jurisdiction, administrative jurisdiction and the role and purpose for which they have been assigned

View Publication Preview PDF
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Reconciliation between Immunity Assessed for the Diplomatic Bag and Considered National Security
...Show More Authors

The diplomatic bag is one of the important means of communication used by the diplomatic mission to communicate with the government of the sending country and its consulates, as well as the missions in other countries. The diplomatic bag was granted absolute immunity against opening, seizing and inspection in order to effectively perform the function entrusted to it. The practical reality revealed the exploitation of the diplomatic bag to smuggle drugs and shipments of weapons and explosives that harmed the national security of the receiving country. The International Law Committee avoided the matter and reconciled the interest of the immunity of the diplomatic bag with the interest of the state in preserving national security and sovere

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 10 2021
Journal Name
Journal Of Physics
A novel kite cross hexagonal search algorithm for fast block motion estimation
...Show More Authors

The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Joint Source-Channel Coding for Wireless Image Transmission based OFDM-IDMA Systems
...Show More Authors

The source and channel coding for wireless data transmission can reduce
distortion, complexity and delay in multimedia services. In this paper, a joint sourcechannel
coding is proposed for orthogonal frequency division multiplexing -
interleave division multiple access (OFDM-IDMA) systems to transmit the
compressed images over noisy channels. OFDM-IDMA combines advantages of
both OFDM and IDMA, where OFDM removes inter symbol interference (ISI)
problems and IDMA removes multiple access interference (MAI). Convolutional
coding is used as a channel coding, while the hybrid compression method is used as
a source coding scheme. The hybrid compression scheme is based on wavelet
transform, bit plane slicing, polynomi

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Pre-operative serum TSH level estimation for predicting malignant nodular thyroid disease
...Show More Authors

Background: the aim of this study was to assess the value of serum thyroid–stimulating hormone (TSH) levels in predicting malignancy in patients with nodular thyroid disease (NTD). Objective: The aim was to examine the relationship between preoperative TSH and differentiated thyroid cancer (DTC).
Patients and Method: all patients with NTD who were admitted in the first surgical unit of Baghdad teaching hospital and assessed for preoperative TSH level before subjecting them for thyroidectomy from first of April 2014 to 31 of January 2016, were included in the study. A preoperative database sheets including Age, gender, nodule size, and pathology were evaluated. Logistic regression analysis was used t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
A Lexical and Syntax Checker Tool for the Hyper Text Markup Language
...Show More Authors

View Publication
Crossref