Preferred Language
Articles
/
alkej-311
Experimental Study Using the Passive Solar Chimney for Evaporative Cooling With PCM and CFM as a Thermal Energy Storage
...Show More Authors

 

      In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3  in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled  in the bottom of TESB of vertical SC. The TESB was made from metallic iron sheets as a shell and fuelled by paraffin wax as phase change material (PCM). The PCM supported by copper foam matrix (CFM) to enhance thermal conductivity of wax. When heat is released from TESB to the air, a buoyancy force will be generated in chimney gaps. Then a difference in pressure between inside and outside test room leads to induce the air flow to test room through wet corrugated cellulose pad, where evaporative cooling (EC) occurs. Results of experimental work, that achieved in June, for 12 to24 hour in the test day, refer to effectiveness using EC to decrease the room temperature comparing. The system reduces test room temperature of up to 8.5~9.2 oC in 11:00 am to 3:00 pm and at highest effectiveness of EC, while minimum reduces in temperature of up to 3.5 oC in 8:00pm to 3:00 am. Also, the results showed the affectivity to using the TESB, during the night time for ventilation and EC, with lower effectiveness than from day time. The range of EC effectiveness equals 30.5-37.5 with a natural vent, while The maximum air change per hour (ACH) equals (3.8-6.187), and the maximum mass flow rate is equal to (36.651 kg.hr-1) at experimental evaluation of the system’s discharge coefficient value 0.371.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
مكتب نور الحسن للنشر والتوزيع
Practical Education and Field Application: A Methodological Vision"
...Show More Authors

Preview PDF
Publication Date
Thu Feb 06 2014
Journal Name
2nd International Conference On Innovation And Entrepreneurship
Is the Organizational Performance of Small Businesses Influenced by HRM Practices and the Governmental Support? A Case of Small Manufacturing Businesses in Malaysia
...Show More Authors

YY Lazim, NAB Azizan, 2nd International Conference on Innovation and Entrepreneurship, 2014

View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Parasitology
The antifungal Aureobasidin A and an analogue are active against the protozoan parasite<i>Toxoplasma gondii</i>but do not inhibit sphingolipid biosynthesis
...Show More Authors

Toxoplasma gondiiis an obligate intracellular protozoan parasite of the phylum Apicomplexa, and toxoplasmosis is an important disease of both humans and economically important animals. With a limited array of drugs available there is a need to identify new therapeutic compounds. Aureobasidin A (AbA) is an antifungal that targets the essential inositol phosphorylceramide (IPC, sphingolipid) synthase in pathogenic fungi. This natural cyclic depsipeptide also inhibitsToxoplasmaproliforation, with the protozoan IPC synthase orthologue proposed as the target. The data presented here show that neither AbA nor an analogue (Compound 20), target the protozoan IPC synthase orthologue or total parasite sphingol

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Resmilitaris
The right to property is a constitutional restriction on the work of the tax legislator
...Show More Authors

The study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the

... Show More
Scopus
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Monetary Policy Management of the Money Supply to Interest rates in Iraqi Economy for the period 2004-2011
...Show More Authors

The results show the inability to apply the Taylor rule within inflation and GDP Gaps because the monetary behave is elated from the Iraqi economy.

When applying the Taylor rule to exchange rate with the inflation and the output gap, the results do not match the nominal price announced by the central thing, which proves the lack of commitment by the Central Bank by using the Taylor rule, whether short-run interest rate or exchange rate (Nominal Anchor),  so it did not stay to the Iraqi Central Bank only using the principle of Taylor with the expected inflation rate below the level of output (Macro activity) for the separation of monetary behavior from the real one o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF