The melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating conditions. Both computational fluid dynamic (CFD) and experimental validations proved the good accuracy of the proposed model for further applications. The present research found that the average PV cell temperature can be reduced by about 12 °C with a corresponding improvement in PCM melting duration of 127%. The addition of the metal foam is more effective at low solar radiation, ambient temperatures far below the PCM solidus temperature, and high wind speeds in nonlinear extension. With increasing of tilt angle, the PCM melting duration is linearly decreased by an average value of (13.4–25.0)% when the metal foam convective heat transfer coefficient is changed in the range of (0.5–20) W/m2.K. The present research also shows that the PCM thickness has a positive linear effect on the PCM melting duration, however, modifying the metal foam configuration from 0.5 to 20 W/m2.K has an effect on the PCM melting duration in such a way that the average PCM melting duration is doubled. This confirms the effectiveness of the inclusion of metal foam in the PV/PCM system.
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreInternal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito
... Show MoreA field experiment was carried out during the 2020 season at the College of Agricultural Engineering/ University of Baghdad, Al-Jadriya to evaluate the effect of dry farming when applying water stress under the subsurface drip irrigation system on water productivity and rice yield. The experiment was conducted with three levels of irrigation water stress when 10, 20 and 40% of the available water was depleted and in three dimensions between drip lines 10, 15 and 20 cm. The experiment was designed according to a randomized complete block design, according to the split plot design, with three replications. Determine the depth of irrigation water depending on the moisture depletion of th
Metal complexes chrome(III), manganese(II), iron(III), cobalt(II), nickel(II), cupper(II) and zinc(II) with diazonium of 3-amino-2-chloropyridine of general formula [2-Cl-C5H3N≡N]n[MXm], where n=2 or 3 for divalent and trivalent metal, m= 4 or 6 were synthesized. The complexes have been characterized by flame atomic absorption, (C.H.N), molar conductance, magnetic susceptibility UV-vis spectra, infrared spectra,1H-NMR spectroscopy and thermo gravimetric analysis (TGA and DTA). The measurements showed that the divalent metal ion complexes (M2+) have (1:2) M:L ratio with tetrahedral geometry around metal ions while the trivalent metal ions (M3+) formed (1:3) m
... Show MoreSynthesis of new Fe+3, Co+2, Cu+2, Ru+3, and Rh+3 complexes of azo ligand; [5-((2-(3 H-1 indol-3-yl) ethyl) diazenyl) quinolin-8-ol], of 1:2 (M: L) and characterized through various techniques. The complexes exhibited octahedral geometries. Thermogravimetric (TGA and DSC) analysis is utilized to study the thermal properties of various compounds and reveal the presence of coordinated water molecules in the complexes. The multi-stage thermal decomposition mechanisms, where the thermal breakdown is ended by the formation of metal oxide as the final stable residue. The antioxidant activity of the ligand and its metal complexes was evaluated using the DPPH free radical scavenging assay and Gallic acid as a standard substance. Among the tested co
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show More