Preferred Language
Articles
/
hRZ5BocBVTCNdQwCry9G
Double-Slope Solar Still Productivity Based on the Number of Rubber Scraper Motions
...Show More Authors

In low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is, 1, 2, 3, 4, 5, 6, and 7, are implemented to increase the hourly yield of solar still (HYSS) of the double-slope solar still hybrid with rubber scrapers (DSSSHS) in areas at low latitudes and develop an accurate model for forecasting the HYSS. The proposed model is developed by determining the best values of the constant factors that are associated with NSM, and the optimal values of exponent (n) and the unknown constant (C) for the Nusselt number expression (Nu). These variables are used in formulating the models for estimating HYSS. The particle swarm optimization (PSO) algorithm is used to solve the optimization problem, thereby determining the optimal yields. Water that condensed and accumulated inside the condensing glass cover of the DSSSHS is collected by increasing NSM. This process increases in the specific productivity of DSSSHS and the accuracy of the HYSS prediction model. Results show that the proposed model can consistently and accurately estimate HYSS. Based on the relative root mean square error (RRMSE), the proposed model PSO–HYSS attained a minimum value (2.81), whereas the validation models attained Dunkle’s (78.68) and Kumar and Tiwari’s (141.37).

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A theoretical Design of a cover for lowering the solar cells temperature and enhance their performance
...Show More Authors

In this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Design and Performance Investigation of a Solar- Powered Biological Greywater Treatment System in the Iraqi Climate
...Show More Authors

            The increase in population resulted in an increase in the consumption of water. The present work investigates the performance of a recycling solar- powered greywater treatment system for the purposes of irrigation, used to reduce the amount of waste grey water and reduce electricity consumption and reduce the costs of constructing large scale water treatment plants. The system consumes about 3814W per hour and provides water treatment about 1.4 m3 per day. The proposed system is designed to    residential, office and governmental buildings application. Tests are conducted in an office building at the Ministry of Science and Technology site in Baghdad. Laboratorial water samples testing analyses are co

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Field Study of Novel Storage Tank of Solar Water Heating System
...Show More Authors

In this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Energy Reports
Study of photoemission and electronic properties of dye-sensitized solar cells
...Show More Authors

We have investigated the photoemission and electronic properties at the PTCDI molecules interface on TiO2 and ZnO semiconductor by means of charge transition. A simple donor acceptor scenario used to calculate the rate for electron transfer of delocalized electronics in a non-degenerately TiO2 and ZnO electrodes to redox localized acceptors in an electrolytic. The dependent of electronic transition rate on the potential at contact of PTCDI with TiO2 and ZnO semiconductors, it has been discussion using TiO2 and ZnO electrodes in aqueous solutions. The charge transfer rate is determining by the overlapping electronic coupling to the TiO2 and ZnO electrodes, the transition energy, potential and polarity media within the theoretical scenario of

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication