Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.
New substituted coumarins derivatives were synthesized by using nitration reaction to produce different nitro coumarin isomers which were separated from these isomers by using different solvent, and the reduction of nitro compounds was done to give corresponding amino coumarins. Temperature and reaction time of reaction were very important factors in determining the most productive nitro isotopes. A low temperature for three hours was sufficient to give a high product of a compound 6-nitro coumarin while increasing the temperature for a period of twenty-four hours that gave a high product of 8-nitro-coumarin. The synthesized compounds were confirmed by FT-IR,1 H-NMR, and13 C-NMR spectroscopy and all final compounds were tested for their ant
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreAs one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreThe synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show MoreTopology and its applications occupy the interest of many researching centers in the advanced world. From this point of view and because the near open sets play a very important role in general topology and they are now the research topics of many topologists worldwide and its sets doesn’t enter in fibrewise topology yet. Therefore, we use some of the near open sets to be model for introduce results and new spaces in fibrewise topological spaces. Also, there is a very important role of closure operators in constructing a topological spaces, so we introduce a new closure operators on the power set of vertices on graphs and conclusion theorems and new spaces from it. Furthermore, we discuss the relationships of connectedness between some ty
... Show MoreA variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show More