By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm under the standard test conditions (STC) and a comparison between the theoretical and experimental results is done to achieve maximum performance ranging from 0.15 to 0.16, particularly with an error of about - 0.333 for an experimental power of 30 Watts compared with the theoretical power of 30.1 Watts. The results obtained by the genetic algorithm give the best value for efficiency at the range of 16% to 17% of solar radiation, from 500–600 W/m2. These values are almost identical to the efficiency obtained from the results of the operation, where the best value for efficiency in the experimental results was seen to be 15.7%.
This research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.
The Gulf Cooperation Council (GCC) is the only one in the Arab system, which has been able to formulate a strategic vision with its dimensions and objectives, and that for its great achievements have contributed significantly to the development of the external and internal economic relations of the Gulf Cooperation Council six through the consolidation of economic policies, projects and joint institutions . There is no doubt that the establishment of the Cooperation Council for the Arab Gulf States six, has made security expensive as long as the aspiration to them the leaders and peoples of the region is the adoption of the GCC countries on itself in order to build a self strength ensures cut off the road to all interference in the affai
... Show MoreThe goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreA recurrent condition that affects up to 10% of people worldwide is gastric ulceration illness. The existence of gastric juice pH with the lowering of mucous defences is prerequisites for the development of chronic ulcers. The main variables affecting the mucosa susceptibility to damage include Helicobacter pylori (H. pylori) infections or non-steroidal anti-inflammatory medicines (NSAIDs). Proton pump inhibitors (PPIs) including histamine-2 (H2) receptor inhibitors, two common therapies for peptic ulcers, have been linked to side impacts, recurrence or a variety of pharmacological combinations. Conversely, therapeutic herbs or the chemicals they contain may be used to cure or eliminate a wide range of illnesses. Therefore, prominent pharma
... Show MoreThis research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.