Due to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor is found to operate excellently at the first mode, 0.6GHz, with S11 impedance matching less than -10dB. The proposed sensor performance is tested experimentally with 15 cases, different patients, through measuring the change in the S11 spectra after direct touching to the sensor a finger print of a patient. The proposed sensor is found to be effectively very efficient detector for blood glucose variation with a low manu facturing cost when printed on an FR-4 substrate. The experi mental measurements are analyzed mathematically to obtain the calibration equation of the sensor from the curve fitting. Finally, the theoretical and the experimental results are found to be agreed very well with a percentage of error less than 10%.
Economic organizations operate in a dynamic environment, which necessitates the use of quantitative techniques to make their decisions. Here, the role of forecasting production plans emerges. So, this study aims to the analysis of the results of applying forecasting methods to production plans for the past years, in the Diyala State Company for Electrical Industries.
The Diyala State Company for Electrical Industries was chosen as a field of research for its role in providing distinguished products as well as the development and growth of its products and quality, and because it produces many products, and the study period was limited to ten years, from 2010 to 2019. This study used the descriptive approa
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Abstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show MoreArab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and lower surfaces of PV panels, air temper
... Show More