Preferred Language
Articles
/
alkej-399
Experimental and Theoretical Study of the Energy Flow of a Two Stages Four Generators Adsorption Chiller
...Show More Authors

This work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C.  As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power is 2.15kW, while the experimental measurement revealed that the cooling capacity of the cycle is about 1.98 kW with a relative error of % 0.02. The generator and condensing temperatures are 83 and 30 °C, respectively. The coefficient of performance (COP) of that chiller was in the range of 0.37 to 0.49. The best operating point and the best working conditions were also investigated. The present chiller is superior more than the single stage, two beds adsorption chiller that works on the activated carbon methanol pair that needs a high ambient temperature.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
ا Hadiths prohibiting the intimidation of a Muslim in the six books - an analytical study
...Show More Authors

This research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
College Of Islamic Sciences
Verbal joint in the Holy Quran A descriptive analytical study
...Show More Authors

The research paper talks about one of the topics that deals with one of the high-style styles in the Holy Qur’an that carries with it a high and influential style in directing the Qur’anic context, as the verses are singled out with certain words, each of which came out to other meanings, which is what was called in the past “what the wording agreed and the meaning differed Or the so-called “faces and analogues” and the meaning of analogues in the language and the Qur’an; To mention a word in a place and it means a meaning other than the other, and to interpret each word with a meaning other than the other meant by the faces, and accordingly the goal of the research is in the linguistic significance, in order to reveal the tr

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Baghdad Science Journal
Adsorption and Kinetic Study of Methylene Blue dye on New Surface Derived from Copolymer (Melamine – Formaldehyde – Para- methyl Anisole)
...Show More Authors

A new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Results In Materials
Adsorption, thermodynamic and corrosion study of enalapril malate pharmaceutical drug as corrosion inhibitor for carbon steel in saline solution
...Show More Authors

Unused and expired pharmaceutical drugs are a novel type of organic corrosion inhibitor. They are less expensive, more effective, and less harmful than conventional organic corrosion inhibitors. This study investigated the effects of concentration, adsorption mechanism and thermodynamic parameters of enalapril malate (ENAP) as a corrosion inhibitor for carbon steel in a saline solution (3.5 % NaCl). The polarization method was used to determine the corrosion rate and inhibition efficiency. Field emission scanning electron microscopy (FE-SEM) and atomic force spectroscopy (AFM) were used to investigate the surface morphology and topography of carbon steel after immersion in both uninhibited and inhibited media for 24 h. Fourier transform inf

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Non-traded Tales in Imami and Hanafi Doctrines (A Comparative Study of Religion Fundamentals)
...Show More Authors

 

The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
A Study of the Effect of Kaolin as a Fuel Oil Additive on the Corrosion Inhibition of Fireside Superheater Boiler Tubes
...Show More Authors

The objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.

      A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Mathematics Trends And Technology (ijmtt)
Some Statistical Properties of the Solutions of a System of two dimensional Integral Equations contains Beta distribution
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref