Preferred Language
Articles
/
ijp-372
Construction and performance study of a solar - powered hybrid cooling system in Iraq
...Show More Authors

The systems cooling hybrid solar uses solar collector to convert solar energy into the source of heat for roasting Refrigerant outside of the compressor and this process helps in the transformation of Refrigerant from the gas to a liquid state in two-thirds the top of the condenser instead of two-thirds the bottom of the condenser as in Conventional cooling systems and this in turn reduces the energy necessary to lead the process of cooling. The system cooling hybrid use with a capacity of 1 ton and Refrigerant type R22 and the value of current drawn by the system limits (3.9-4.2A), the same value of electric current calculated by the system are  Conventional  within this atmosphere of Iraq, and after taking different readings of the temperatures and pressure to several points in the system's found that the Refrigerant when it comes out of the compressor, it loses part of the temperature of the water in the solar collector through a heat exchanger while the literature published in accordance with the manufacturers that the solar collector, a kind of vacuum tubes contributes to raise the pressure and temperature of the fluid cooler to reduce the consumption of energy spent on compressor. Therefore, the system described by the current not fit for domestic use within the Iraqi environmental conditions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Bulletin Of The Iraqi Natural History Meseum
Morphological and molecular study of three species of Acrobeloides (Cobb, 1924) Thorn, 1937(Rhabdida, Cephalobidae) as new record in Iraq
...Show More Authors

.

Publication Date
Tue Jan 01 2019
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Integrating the value chain and balanced scorecard to evaluate the overall performance of a tourism organization
...Show More Authors

This study presented an endeavour to integrate the value chain activities with the Balanced Scorecard for a comprehensive evaluation of an organization’s strategic performance. It also demonstrated the connection and the integration of the activities of the value chain with the Balanced Scorecard. The financial measurement was linked with non-financial measurement by integrating these techniques to achieve an appropriate performance that supports all aspects of the organizational performance. Consequently, the research problem in this study emerged, which is due to the concentration of many organizations on the measurement of financial performance. Notably, the latter caused the decline of some organizations from the competitive market. T

... Show More
Scopus (10)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study for evidence of bacteria contamination in the southern part of the Diyala River / Iraq
...Show More Authors

Were studied some bacteria evidence of pollution as well as the total number of live bacteria in the waters of the Diyala river and selected five stations within the 17 km final Diyala River before its mouth in the Tigris River was the first before the new bridge of the Diyala River about 4 km and the second after the mouth of the water purification plant Rustumiya suit inverselywith temperatures

View Publication Preview PDF
Publication Date
Tue Mar 02 2021
Journal Name
Sustainability
Effect of Twisted Fin Array in a Triple-Tube Latent Heat Storage System during the Charging Mode
...Show More Authors

This study aims to assess the effect of adding twisted fins in a triple-tube heat exchanger used for latent heat storage compared with using straight fins and no fins. In the proposed heat exchanger, phase change material (PCM) is placed between the middle annulus while hot water is passed in the inner tube and outer annulus in a counter-current direction, as a superior method to melt the PCM and store the thermal energy. The behavior of the system was assessed regarding the liquid fraction and temperature distributions as well as charging time and energy storage rate. The results indicate the advantages of adding twisted fins compared with those of using straight fins. The effect of several twisted fins was also studied to discover

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (9)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref