In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigated using fluid simulation. In the simulation, the ideal temperature for each part of the body is defined and compared with the operative temperature to verify how close both temperatures are, resulting in determining the ideal setting temperature. The simulation result shows, that most parts of the body reach their ideal temperatures. In addition, the optimum setting temperature and position of each air-conditioning vent, which contribute to maintaining the thermal comfort of the human body on the plane, is clarified.
Air-conditioning systems (ACs) are essential in hot and humid climates to ensure acceptable ambient air quality as well as thermal comfort for buildings users. It is essential to improve refrigeration system performance without increasing the effects of global warming potential (GWP) and ozone depletion potential (ODP). The main objective of this study is to evaluate the performance of an air conditioning system that operates with a liquid suction heat exchanger (LSHX) through implementing refrigerants with zero OPD and low GWP (i.e., R134a and R1234yf). Liquid suction heat exchanger (LSHX) was added to an automobile air conditioning system (AACS).When Liquid suction heat exchanger was added to the cycle, primary results indicated t
... Show MoreNowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreThe characteristics of physical architecture in the Levant and the island are characterized by a lot of attention and care, as they are a pillar of the urban movement in every place and time.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe research seeks to know the social loafing of kindergarten teachers and their relation to personality traits. In order to achieve the research objectives, the researcher constructed the social loafing scale, which she applied to kindergarten teachers. The scale consists of (22) paragraphs. It has good credibility and stability. The coefficient of stability (85.0) was the retest method and (81.0) Alpha Cronbach equation. In addition, the researcher has adopted (Raymond Cattel) personality traits scale, which has been adapted to the Arab environment (Abdel Rahman and Abu Abada,1998), The scale consists of (39) paragraphs, and enjoys the apparent honesty. The measure of social loafing and the measure of personality traits was applied to
... Show MoreAbstract
The research has discussed the public relations as dependent variable of its branch dimensions( confidence , commitment, control and satisfaction ) and the governmental service quality as independent variable of its branch dimensions (response, dependency, emphasis, tangibility and sympathy), and the research problem has represented by weakness of service quality presented to the customers dealing with company, which is observed via field co-existence of the researcher, where he observe that the quality presented in the company services, are inappropriate with the customers expectations level, also there is weakness of attention and recognition by the
امكانية تكييف نظام الجودة في شركة الاسمنت العراقية وفقا لمتطلبات نموذج تاكيد الجودة iso9001 الخاص بنظام العمل والعاملين دراسة استطلاعية لاراء عينة من المديرين في الشركة
Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show More