Double skin ventilated roof is one of the important passive cooling techniques that aims to reduce solar heat gain through roofs by reducing both the conduction and convection heat transfer from the roof to the ceiling of buildings. On the other hand, radiant barrier system (RBS) is very powerful in blocking the radiation heat transfer between the two skins. In this research,the effect of placing a thin layer of aluminium foil at different locations on the thermal insulation performance of a double skin ventilated roof model is investigated experimentally and the optimum location that transmits less heat flux from the lower skinis specified.The model is made of two parallel inclined galvanized steel plates. Galvanized steel has been used in the roof construction of industrial buildings and storehouses in Iraq.The radiant barrierisapplied alternately, on the outer surface of the upper skin, on the inner surface of the upper skin, suspended in the airgap between the skins, and on the inner surface of the lower skin.These casesareconsidered as Model A, Model B, Model C, and Model D, respectively. It is found that the radiant barrier can block up to78% of the heat in Model A, 71% in Model B, 94% in Model C, and 91% in Model D as compared with the Basic Model.Since the radiant barrierin both Model C and Model D blocks almost the same amount of heat, the location of the radiant barrierin Model D is chosen as the optimumradiant barrierlocation because this model is more practical.
The possibility of predicting the mass transfer controlled CaCO3 scale removal rate has been investigated.
Experiments were carried out using chelating agents as a cleaning solution at different time and Reynolds’s number. The results of CaCO3 scale removal or (mass transfer rate) (as it is the controlling process) are compared with proposed model of prandtl’s and Taylor particularly based on the concept of analogy among momentum and mass transfer.
Correlation for the variation of Sherwood number ( or mass transfer rate ) with Reynolds’s number have been obtained .
The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreAim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables
Dealing with this study to find a link principle in the construction of the system and disorder to the promise of the principles and concepts of intellectual and philosophical form and content in the act of interior design of the halls education in the Ministry of Labor and Social Affairs , which leads to a reaction design objective and functionally and to increase the strength of the effect on users of the coaches and trainers . As it informs the side cognitive and developmental study of the design of the interior spaces . So it was the goal of research in the detection of the nature of the system and disorder with Focus indicators and the type of regulations and privacy and what constitutes the framework of knowledge in order to explai
... Show MoreIncreasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreThe result showed that hot water and ethanol extracts of Nigella sativa contain alkaloids ,saponins, flavonoids,tannins,glycosides,terpins and steroids. Albino mice were administered orally with 0.1 of the extract at dose of 100 mg/kg, body weight the results showed high level of white blood cell ,total and differential count of WBC,phagocytosis index, mitotic index, Arthus and delayed type hypersensitivity. The result, also showed high level of hemoglobin (Hb) and the packed cell volume (PCV) the alcoholic extract has been found more efficient than hot water extract on mice.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MorePulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u
... Show More