As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThis work was conducted to study the coefficient of performance for solar absorption refrigeration by using direct solar energy using aqueous ammonia 0.45 mass fraction (ammonia – water).The experiments were carried out in solar absorption system .The system consisted of solar collector generator (0.25 m × 0.25 m × 0.04m) and condenser cooled by a water bath followed by liquid receiver and evaporator. The results showed that the maximum generator temperature was (92° - 97°) during June 2009, and the minimum evaporator temperature was (5°C - 10°C) for aqua ammonia system.. It was, also, found that the coefficient of performance, cooling ratio and amount of cooling obtainable increased with increasing maximum generator temperature
... Show MoreThis work investigates the impacts of eccentric-inclined load on ring footing performance resting on treated and untreated weak sandy soil, and due to the reduction in the footing carrying capacity due to the combinations of eccentrically-inclined load, the geogrid was used as reinforcement material. Ring radius ratio and reinforcement depth ratio parameters were investigated. Test outcomes showed that the carrying capacity of the footing decreases with the increment in the eccentric-inclined load and footing radius ratio. Furthermore, footing tilt and horizontal displacement increase with increasing the eccentricity and inclination angle, respectively. At the same time, the increment in the horizontal displacement due t
... Show MoreKlebsilla pneumoniae is one of must opportunistic pathogens that causes nosocomial infection, UTI, respiratory tract infections and blood infections. ZrO2 nanoparticles have antimicrobial activity against some pathogenic bacteria and fungi. Ceftazidime is one of third generation cephalosporins groups of antibiotecs, characterized by its broad spectrum on bacteria in general and particularly on Enterobacteriaceae family like Klebsiella spp. Method: Diverse clinical samples of Klebsilla pneumoniae were isolated from several hospitals in Baghdad – Iraq and ZrO2 nanoparticles was investigated against it. Ceftazidime was also investigated against K. pneumoniae. Both of ZrO2 nanoparticles and ceftazidime were mixed together and investigated aga
... Show MoreFace Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap
... Show MoreAutonomous systems are these systems which power themselves from the available ambient energies in addition to their duties. In the next few years, autonomous systems will pervade society and they will find their ways into different applications related to health, security, comfort and entertainment. Piezoelectric harvesters are possible energy converters which can be used to convert the available ambient vibration energy into electrical energy. In this contribution, an energy harvesting cantilever array with magnetic tuning including three piezoelectric bimorphs is investigated theoretically and experimentally. Other than harvester designs proposed before, this array is easy to manufacture and insensitive to manufacturi
... Show MoreThis paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.
A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.
An improvement was achieved with the proposed method in comparison with the conventional method.
The performance of this technique has been done by computer using Visual Baisec.6 package.
Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreTitanium dioxide TiO2 has been widely utilized in cleaning and sterilizing material for many clinical tools sanitary ware, food tableware and cooking and items for use in hospitals. Titanium dioxide TiO2 non toxicity and long term physical and chemical stability. It has been widely used decomposition of organic compounds and microbial organisms such as cancer cell, viruses and bacteria as well as its potential application in sterilization of medical devices. The aim of the study the effect of titanium dioxide TiO2 on some Gram negative bacteria and study their effects on some virulence factors and chromosomal DNA.In this study, we obtained (E. coli ? Proteus mirabilis, Proteus vulgaris ? Pseudomonas aeruginosa ? Klebsiella pneumonia and Ac
... Show More