This work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C. As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power is 2.15kW, while the experimental measurement revealed that the cooling capacity of the cycle is about 1.98 kW with a relative error of % 0.02. The generator and condensing temperatures are 83 and 30 °C, respectively. The coefficient of performance (COP) of that chiller was in the range of 0.37 to 0.49. The best operating point and the best working conditions were also investigated. The present chiller is superior more than the single stage, two beds adsorption chiller that works on the activated carbon methanol pair that needs a high ambient temperature.
Epithelial‐mesenchymal transition (
The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show More
In this paper, we introduce and study new types of soft open sets and soft closed
sets in soft bitopological spaces (X,~ ,~ ,E) 1 2 , namely, (1,2)*-maximal soft open
sets, (1,2)*-maximal soft (1,2)*-pre-open sets, semi (1,2)*-maximal soft (1,2)*-preopen
sets, (1,2)*-maximal soft closed sets, (1,2)*-maximal soft (1,2)*-pre-closed
sets, (1,2)*-minimal soft open sets, (1,2)*-minimal soft (1,2)*-pre-open sets, (1,2)*-
minimal soft closed sets, (1,2)*-minimal soft (1,2)*-pre-closed sets, and semi (1,2)*-
minimal soft (1,2)*-pre-closed sets. Also, properties and the relation among these
concepts have been studied.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThe present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro
... Show MoreLos nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería entonces cuestión de modas. Pero, eviden
... Show MoreBackground: Dorsal plication on each side of the penis at the 2 and 10-o’clock positions had been a mainstay for correction of ventral penile curvature. However, because only the 12-o’clock position proved to be a nerve-free zone, dorsal plication at the 12-o’clock position can be advocated.
Objectives: To evaluate tunica albuginea plication with and without neurovascular bundle mobilization in patients with ventral penile curvature. Type of the study: A prospective study.
Methods: A 34 patients with a mean age of (4.8 ± 0.54) years, Who still
This paper deals with testing a numerical solution for the discrete classical optimal control problem governed by a linear hyperbolic boundary value problem with variable coefficients. When the discrete classical control is fixed, the proof of the existence and uniqueness theorem for the discrete solution of the discrete weak form is achieved. The existence theorem for the discrete classical optimal control and the necessary conditions for optimality of the problem are proved under suitable assumptions. The discrete classical optimal control problem (DCOCP) is solved by using the mixed Galerkin finite element method to find the solution of the discrete weak form (discrete state). Also, it is used to find the solution for the discrete adj
... Show More