A linear engine generator with a compact double-acting free piston mechanism allows for full integration of the combustion engine and generator, which provides an alternative chemical-to-electrical energy converter with a higher volumetric power density for the electrification of automobiles, trains, and ships. This paper aims to analyse the performance of the integrated engine with alternative permanent magnet linear tubular electrical machine topologies using a coupled dynamic model in Siemens Simcenter software. Two types of alternative generator configurations are compared, namely long translator-short stator and short translator-long stator linear machines. The dynamic models of the linear engine and linear generator, validated with lab-scale prototypes, are applied to investigate the influence of alternative topologies of the generator on system performance. The coupled model will facilitate the early design phase and reveal the optimal match of the key parameters of the engine and generator. Then, experimental tests on an integrated compressor cylinder-generator prototype were successfully performed, and it is shown that this concept is feasible and electrical power and compressed working fluid, such as air, can be generated by this prototype.
The current research attempts to find a feed additive that enhances fish growth and eliminate toxins generated from fungi and mold, which are found in improperly manufactured and stored feed, while ensuring the safety of these fish meat for the consumer. Therefore, the organic properties of chitosan powder were examined in order to determine its impact on maturation of young
The Indoor Environmental Quality (IEQ) describes an indoor space condition that the wellbeing and comfortability are provided for the users. Many researchers have highlighted the importance of adopting IEQ criteria, although they are not yet well defined in the Kurdistan region. However, environmental quality is not necessary for the contemporary buildings of the Kurdistan Region, and there is no measurement tool in the Region. This research aims to develop an IEQ assessment tool for the Kurdistan region using Mixed method methodology, both qualitative and quantitative. Therefore, a Delphi Technique was used as a method initially developed as systematic, interactive forecasting on a panel of experts. Thirty-five Delphi C
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
Experiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).
The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?
The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the
... Show MoreA new results for fusion reactivity and slowing-down energy distribution functions for controlled thermonuclear fusion reactions of the hydrogen isotopes are achieved to reach promising results in calculating the factors that covered the design and construction of a given fusion system or reactor. They are strongly depending upon their operating fuels, the reaction rate, which in turn, reflects the physical behavior of all other parameters characterization of the system design
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More