A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and industry. Results show that these filters possess good transmission and return loss characteristics, besides the miniaturized sizes meeting the design specifications of most of wireless communication systems.
In this paper, simulation study of the frequency shift of photonic bandgaps due to refractive index scaling using liquids filled hollow-core photonic crystal fibers is presented. Different liquids (distilled water, n-hexane, methanol, ethanol and acetone) are used to fill the cladding of 2 types of hollow core photonic crystal fibers (HC19-1060, HC7-1060). These liquids are used to change the effective index scaling and index contrast of the cladding. The effect of increasing temperature of the liquid (20-100 0C for water and 20-70 0C for other liquids ) infiltrated hollow core fiber on the bandgap width and transmission properties has been computed. The maximum photonic bandgap width at 0.0243 has appeared with filling HC7-1060 PCF with
... Show MoreThis work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C. As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power
... Show MoreAbstract
The catalytic cracking conversion of Iraqi vacuum gas oil was studied on large and medium pore size (HY, HX, ZSM-22 and ZSM-11) of zeolite catalysts. These catalysts were prepared locally and used in the present work. The catalytic conversion performed on a continuous fixed-bed laboratory reaction unit. Experiments were performed in the temperature range of 673 to 823K, pressure range of 3 to 15bar, and LHSV range of 0.5-3h-1. The results show that the catalytic conversion of vacuum gas oil increases with increase in reaction temperature and decreases with increase in LHSV. The catalytic activity for the proposed catalysts arranged in the following order:
HY>H
... Show MoreElectrochemical Grinding (ECG) process is a mechanically assisted electrochemical process for material processing. The process is able to successfully machine electrically conducting harder materials at faster rate with improved surface finish and dimensional control. This research studies the effect of applied current, electrolyte concentration, spindle speed and the gap between workpiece and tool on hardness and material removal rate during electrochemical grinding for stainless steel 316. The characteristic features of the electrochemical grinding process are explored through Taguchi-design-based experimental studies. The better hardness can be obtained at 10 A of the current, 150 g/l of the electrolyte concentration, 0.3 mm of gap an
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More