Double skin ventilated roof is one of the important passive cooling techniques that aims to reduce solar heat gain through roofs by reducing both the conduction and convection heat transfer from the roof to the ceiling of buildings. On the other hand, radiant barrier system (RBS) is very powerful in blocking the radiation heat transfer between the two skins. In this research,the effect of placing a thin layer of aluminium foil at different locations on the thermal insulation performance of a double skin ventilated roof model is investigated experimentally and the optimum location that transmits less heat flux from the lower skinis specified.The model is made of two parallel inclined galvanized steel plates. Galvanized steel has been used in the roof construction of industrial buildings and storehouses in Iraq.The radiant barrierisapplied alternately, on the outer surface of the upper skin, on the inner surface of the upper skin, suspended in the airgap between the skins, and on the inner surface of the lower skin.These casesareconsidered as Model A, Model B, Model C, and Model D, respectively. It is found that the radiant barrier can block up to78% of the heat in Model A, 71% in Model B, 94% in Model C, and 91% in Model D as compared with the Basic Model.Since the radiant barrierin both Model C and Model D blocks almost the same amount of heat, the location of the radiant barrierin Model D is chosen as the optimumradiant barrierlocation because this model is more practical.
In this paper two axis sun tracking method is used to absorb maximum power from the sun's rays on the solar panel via calculating the sun’s altitude and azimuth angles, which describe the solar position on the Iraqi capital Baghdad for the hours 6:00, 7:00, 8:00, 9:00, 12:00, 15:00 and 17:00 per day. The angles were calculated in an average approach within one month, so certain values were determined for each month. The daily energy achieved was calculated for the solar tracking method compared with the fixed tracking method. Designed, modeled and simulated a control circuit consisting of reference position truth table, PI Controller and two servomotors that tracked the sun position to adjust the PV panel perpendicular
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show More