To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreThe presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s
... Show MoreThe increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage (5, 10 and 20 wt.% ) of (n-heptane, toluene, and a mixture of different ratio
... Show MoreDiabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreGrain size and shape are important yield indicators. A hint for reexamining the visual markers of grain weight can be found in the wheat grain width. A digital vernier caliper is used to measure length, width, and thickness. The data consisted of 1296 wheat grains, with measurements for each grain. In this data set, the average weight (We) of the twenty-four grains was measured and recorded. To determine measure of the length (L), width (W), thickness (T), weight (We), and volume(V). These features were manipulated to develop two mathematical models that were passed on to the multiple regression models. The results of the weight model demonstrated that the length and width of the grai