Preferred Language
Articles
/
alkej-278
Prediction of Performance Equations for Household Compressors Depending on Manufacturing Data for Refrigerators and Freezers
...Show More Authors

Abstract

 A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.

Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.

The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling capacity and 50 models for power consumption and 25 models for refrigerant mass flow rate.

 Keywords: Performance, compressors, manufacturing, data, equations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Continuous improvement of technology and its role In reducing the costs in accordance with the management style On the basis of the activities (ABM): Applied Research in the General Company for Textile Industries / hula
...Show More Authors

The administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and  enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality   and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce  costs) to prove the hypothesis has sought research to achieve its goal of  Alkadivh and Alkoppelan     &nb

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of the change process in enhancing organizational performance (Analytical research)
...Show More Authors

  This research aims to test the relation and effect of the process of organizational change as an independent variable (change in human resources, technological change, change in tasks, change in organizational structure) in organizational performance as a variable of success (financial performance, operational performance, customer satisfaction, growth). And learning) in the Office of the province of Baghdad, as well as determine the existence of differences of statistical significance between the variables of research, and then try to come out with a set of recommendations to contribute to the strengthening of organizational performance, and carried out this research on the eye of the vertical number (75) individuals, The

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 13 2019
Journal Name
Journal Of Northern Europe Academy For Studies & Research Denmark
The relationship between motor response speed and performance of the volleyball smash skill for students at the University of Baghdad - College of Physical Education and Sports Sciences
...Show More Authors

NEACADEMY's JOURNALS

View Publication
Publication Date
Mon May 17 2021
Journal Name
Indian Journal Of Forensic Medicine &amp; Toxicology
The Effect of Exercises with a Proposed Device to Improving Some Bio-Kinematic Variables and the Performance of the Arab Round off Skill on Floor Movement Mat Device of the Artistic Gymnastics for Women
...Show More Authors

The importance of the research lies in preparing exercises using a proposed device to learn the skill of thehuman wheel on a machine rug of ground movements of the artistic gymnastics. As for the research problem:Through the presence of the two researchers as teachers and observers of this sport in the gymnastics hall,they noticed that there is difficulty in the students’ performance of the skill of the round off on the machineof the mat of ground movements, according to the researchers’ opinion, the reason for this is that skillsare taught with the limited availability of assistive devices, as well as the lack of use of these devices inexercises according to biomechanical variables, although they facilitate the learning process

... Show More
View Publication
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Blended Learning Program Based on the Next Generation Standards (NYS) to Develop the Teaching Performance of Middle School Mathematics Teachers and Some Students’ Future Thinking Skills
...Show More Authors

Abstract

The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Legal adjustment of zakat on property prepared for sale
...Show More Authors

Praise be to God, who said: {And establish prayer and pay zakat and lend to God a good loan, and whatever good you put forward for yourselves you will find with God. It is better and greater in reward. Ask forgiveness of God. Indeed, God is Forgiving, Most Merciful. May blessings and peace be upon Muhammad, the servant of God, and His Messenger, may God bless him and grant him peace, who said: “Islam is built on five Testifying that there is no god but God and that Muhammad is the Messenger of God, establishing prayer, paying zakat, Hajj, and fasting Ramadan” ().
Now that follows: Islamic law aims to make man happy in this world and the afterlife, starting with faith in God Almighty until the end of the legal obligations. This is

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 13 2020
Journal Name
Journal Of Imaging
On Computational Aspects of Krawtchouk Polynomials for High Orders
...Show More Authors

Discrete Krawtchouk polynomials are widely utilized in different fields for their remarkable characteristics, specifically, the localization property. Discrete orthogonal moments are utilized as a feature descriptor for images and video frames in computer vision applications. In this paper, we present a new method for computing discrete Krawtchouk polynomial coefficients swiftly and efficiently. The presented method proposes a new initial value that does not tend to be zero as the polynomial size increases. In addition, a combination of the existing recurrence relations is presented which are in the n- and x-directions. The utilized recurrence relations are developed to reduce the computational cost. The proposed method computes app

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref