Preferred Language
Articles
/
cBf-oo4BVTCNdQwC5Fab
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations, if the summer season witnesses it. The Iraqis have a major interruption of electrical power, which forces them to buy electricity from the owners of private generators, and they are subject to their implementation and exploitation. Prices per ampere, as the price of an ampere in hot summer reaches $20, according to their desires, in addition to the environmental pollution left by those generators, as they are usually in residential neighborhoods and near homes, which increases From pollution of fresh air and the environment in residential neighborhoods, and this is what necessitated the aim of this study to find realistic solutions that are in line with the current situation that wounded Iraq is living, as it possesses enormous natural resources, and praise be to God, Lord of the Worlds. Despite all this, Iraq provides energy to most countries, and it suffers from severe power outages. Our study aims to find other alternatives to obtain renewable energy. By building more solar panels and wind turbines to play a decisive role in achieving this goal, which is to provide clean energy, especially since the climate of the Middle East in general and Iraq in particular has solar energy available throughout the year, especially in the hot summer season, and by using artificial intelligence it may be possible to store that energy and save it when needed.

Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Characterization Performance of Monocrystalline Silicon Photovoltaic Module Using Experimentally Measured Data
...Show More Authors

Solar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Stabilization of Al-Rustamiya Waste Water Treatment Plant Sludge Using Lime
...Show More Authors

A study was performed to evaluate heavy metals removal from sewage sludge using lime. The processes of stabilization using alkaline chemicals operating on a simple principle of raising pH to 12 or higher, with sufficient mixing and suitable contact time to ensure that immobilization can reduce heavy metals. A 0.157 m3 tank was designed to treat Al-Rustemeyia wastewater treatment plant sludge. Characteristics of raw sludge were examined through two parameters: pH and heavy metal analysis. Different lime doses of (0- 25) g CaO/100 g sludge were mixed manually with raw sludge in a rotating drum. The samples were analyzed two hours after mixing. pH and heavy metals results were compared with EPA and National Iraqi Stand

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 15 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
INHIBITORY EFFECT OF THYMOL EXTRACTS ON ENTEROTOXINS PRODUCTION BY Staphylococcus aureus.: INHIBITORY EFFECT OF THYMOL EXTRACTS ON ENTEROTOXINS PRODUCTION BY Staphylococcus aureus.
...Show More Authors

One hundred and eighty five urine samples were collected eight isolates (4.3%) were obtained and diagnosed as Staphylococcus aureus. Among 8 isolates, 5 (62.5%) S. aureus isolates were found to be enterotoxigenic, most of isolates produced at least two types of Staphylococcal enterotoxins (SEs). The production of enterotoxins in the presence or absence of Thymol extracts (aqueous and alcoholic) were estimated using a reversed passive latex agglutination (SET-RPLA) kit. The extracts reduced enterotoxin production compared with the control. Enterotoxin inhibition was observed for enterotoxin C production at minimal inhibitory concentrations (MIC) at 400 µg/ml, whereas production of enterotoxins A, B, and

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
World Journal Of Dentistry
Obturation of Lateral Canals by a New Reciprocating Spreader and a Conventional Finger Spreader by Lateral Condensation Technique: in vitro Comparative Study
...Show More Authors

View Publication
Scopus (2)
Scopus
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The Epistemological The Epistemological Foundations for Comparison of Religions by al-Amiri: The Epistemological Foundations for Comparison of Religions by al-Amiri
...Show More Authors

 

 Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)

The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?

The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Experimental Study of the Thermal Performance of Flat Plate Solar Collectors Array by Different Connection Configurations
...Show More Authors

The current research illustrates experimentally the effect of series and parallel connection (Z-I Configurations) of flat plate water solar collectors array on the thermal performance of closed loop solar heating system. The study includes the effect of changing the water flow rate on the thermal efficiency. The results show that, the collector's efficiency in series connection is higher than the parallel connection within flow rate level less than (100) ℓ/hr. Moreover, the collector efficiency in parallel connection of (I-Configurations) is more than the (Z- Configurations) with increasing the water flow rate .The maximum daily efficiency for parallel (I-Configurations) and (Z- Configurations) are (55%) and (51%) at w

... Show More
View Publication Preview PDF
Publication Date
Fri May 30 2025
Journal Name
Journal Of Internet Services And Information Security
Enhancing Lung Cancer Classification using CT Images using Processing Techniques Employing U-Net Architecture
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Iraqi Journal Of Science
Simulation of Solar Coronal Magnetic Field Using Potential Field Model
...Show More Authors

In this paper, 3D simulation of the global coronal magnetic field, which use observed line of sight component of the photosphere magnetic field from (MDI/SOHO) was carried out using potential field model. The obtained results, improved the theoretical models of the coronal magnetic field, which represent a suitable lower boundary conditions (Bx, By, Bz) at the base of the linear force-free and nonlinear force free models, provides a less computationally expensive method than other models. Generally, very high speed computer and special configuration is needed to solve such problem as well as the problem of viewing the streamline of the magnetic field. For high accuracy special mathematical treatment was adopted to solve the computation comp

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF