Preferred Language
Articles
/
joe-733
Experimental Study on Double-Pass Solar Air Heater with and without using Phase Change Material
...Show More Authors

In this paper, an experimental study was conducted to enhance the thermal performance of a double-pass solar air heater (SAH) using phase change material (PCM) for thermal storage at climatic conditions of Baghdad city - Iraq. The double-pass solar air heater integrated with thermal storage system was manufactured and tested to ensure that the air heating reserved after the absence of the sun. The rectangular cavity filled with paraffin wax was used as a latent heat storage and incorporated into the lower channel of solar air heater. Experiments were carried out to evaluate the charging and discharging characteristics of two similar designed solar air collectors with and without using phase change material at a constant air mass flow rate of (0.0375 kg/sec). The parameters that affect the thermal performance of the SAH with and without the PCMs presented by solar radiation, the difference in air temperature, outlet air temperature, instantaneous thermal efficiency, and daily efficiency are evaluated. The experimental results show that when using the PCM, the temperature of the outlet air was enhanced and increased over the ambient temperature by (1.5 - 6.5 C) after sunset for 5 hours period. It was found that the instantaneous thermal efficiency of the heater using thermal storage exceeds 100% after sunset, this is due to a large amount of heat stored in the paraffin wax that has been released during the discharge process. Also, it was found that the daily efficiency of the double pass SAH integrated with and without thermal energy storage unit was (56, 47%) respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and Periapical Healing of Immature Teeth Using Mineral Trioxide Aggregate
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (89)
Crossref (90)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Sustainability
Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database
...Show More Authors

This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst

... Show More
View Publication Preview PDF
Scopus (84)
Crossref (86)
Scopus Clarivate Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (38)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (22)
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Fundamentalist detective On matters of consensus   Of Khala book complete the teacher benefits of Muslim Judge Ayaz (May God have mercy on him): Comparative fundamentalist study
...Show More Authors

Fundamentalist detective
On matters of consensus
  Of Khala book complete the teacher benefits of Muslim
Judge Ayaz
(May God have mercy on him)

View Publication Preview PDF