Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
Heat pipes and two‐phase thermosyphon systems are passive heat transfer systems that employ a two‐phase cycle of a working fluid within a completely sealed system. Consequently, heat exchangers based on heat pipes have low thermal resistance and high effective thermal conductivity, which can reach up to the order of (105 W/(m K)). In energy recovery systems where the two streams should be unmixed, such as airconditioning systems of biological laboratories and operating rooms in hospitals, heat pipe heat exchangers (HPHEs) are recommended. In this study, an experimental and theoretical study was carried out on the thermal performance of an air‐to‐air HPHE filled with two refrigerants as working fluids, R22 and R407c. The heat pipe he
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
The objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
The current research aims to answer the following questions: what is the substance of democracy? What is the content of a democratic society? What is the role of university professor in the democratic development of the student university in light of the new Iraqi society? In order to achieve the goals of the research, the researcher developed an a questionnaire based on literature, Iraq's draft constitution in 2005, and his experience of the field of teaching human rights and public freedoms and the teaching of democracy. It was applied to a sample of faculty members in Department of Education and Psychology / College of Education / University Baghdad for the year 20014 were obtained their answers were then processed statistically. Henc
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show More