Preferred Language
Articles
/
bsj-6467
Design of a Simple Dust Removal System for a Solar Street Light System
...Show More Authors

      Dust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact on solar panel performance. Also it studied permeability with the wavelength of three types of soil. The system has relatively low current and voltage consumption; it can be generalized for easy manufacturing and locally available components and is well effective.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Biores Scientica
Type IV Flexor Digitorum Profundus Avulsion: A Case Report
...Show More Authors

Abstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Cavitation microbubbles in the medical ultrasound imaging: A Review
...Show More Authors

Ultrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro

... Show More
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
مجلة الأستاذ للعلوم الإنسانية والاجتماعية
Impoliteness in Some American Presidential Debates: A Pragmatic Study
...Show More Authors

The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason

... Show More
Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed May 04 2016
Journal Name
Journal Of New Theory
INTERSECTİONAL (α,A )-SOFT NEW-İDEALS İN PU-ALGEBRAS
...Show More Authors

Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus