The systems cooling hybrid solar uses solar collector to convert solar energy into the source of heat for roasting Refrigerant outside of the compressor and this process helps in the transformation of Refrigerant from the gas to a liquid state in two-thirds the top of the condenser instead of two-thirds the bottom of the condenser as in Conventional cooling systems and this in turn reduces the energy necessary to lead the process of cooling. The system cooling hybrid use with a capacity of 1 ton and Refrigerant type R22 and the value of current drawn by the system limits (3.9-4.2A), the same value of electric current calculated by the system are Conventional within this atmosphere of Iraq, and after taking different readings of the temperatures and pressure to several points in the system's found that the Refrigerant when it comes out of the compressor, it loses part of the temperature of the water in the solar collector through a heat exchanger while the literature published in accordance with the manufacturers that the solar collector, a kind of vacuum tubes contributes to raise the pressure and temperature of the fluid cooler to reduce the consumption of energy spent on compressor. Therefore, the system described by the current not fit for domestic use within the Iraqi environmental conditions.
This study presented an endeavour to integrate the value chain activities with the Balanced Scorecard for a comprehensive evaluation of an organization’s strategic performance. It also demonstrated the connection and the integration of the activities of the value chain with the Balanced Scorecard. The financial measurement was linked with non-financial measurement by integrating these techniques to achieve an appropriate performance that supports all aspects of the organizational performance. Consequently, the research problem in this study emerged, which is due to the concentration of many organizations on the measurement of financial performance. Notably, the latter caused the decline of some organizations from the competitive market. T
... Show MoreWere studied some bacteria evidence of pollution as well as the total number of live bacteria in the waters of the Diyala river and selected five stations within the 17 km final Diyala River before its mouth in the Tigris River was the first before the new bridge of the Diyala River about 4 km and the second after the mouth of the water purification plant Rustumiya suit inverselywith temperatures
This study aims to assess the effect of adding twisted fins in a triple-tube heat exchanger used for latent heat storage compared with using straight fins and no fins. In the proposed heat exchanger, phase change material (PCM) is placed between the middle annulus while hot water is passed in the inner tube and outer annulus in a counter-current direction, as a superior method to melt the PCM and store the thermal energy. The behavior of the system was assessed regarding the liquid fraction and temperature distributions as well as charging time and energy storage rate. The results indicate the advantages of adding twisted fins compared with those of using straight fins. The effect of several twisted fins was also studied to discover
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More