In this work, the superconducting CuBa2LaCa2Cu4O11+δ compound was prepared by citrate precursor method and the electrical and structural properties were studied. The electrical resistivity has been measured using four probe test to find the critical temperature Tc(offset) and Tc(onset). It was found that Tc (offset) at zero resistivity has 101 K and Tc (onset) has 116 K. The X-ray diffraction (XRD) analysis exhibited that a prepared compound has a tetragonal structure. The crystal size and microscopic strain due to lattice deformation of CuBa2LaCa2Cu4O11+δ were estimated by four methods, namely Scherer(S), Halder-Wagner(H-W), size-strain plot (SSP) and Williamson-Hall, (W-H) methods. Results of crystal sizes obtained by these methods were compared with each other. In all these methods, the values of βhkl (full-width half-maximum (FWHM) for diffraction peaks) and miler indices (hkl) are determined from the results obtained from Fullprof, Mach, Origin and VESTA software. The lattice parameters a, b and c, lattice shape, d and degree of crystallization were calculated. It was found that the crystal size which are calculating by S, W-H, SSP and H-W were (174.8472, 171.1776, 173.1009 and 175.4386) A0 respectively while the lattice strain values were (none, 0.0025, 0.004 and 0.003464), respectively.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show More