The systems cooling hybrid solar uses solar collector to convert solar energy into the source of heat for roasting Refrigerant outside of the compressor and this process helps in the transformation of Refrigerant from the gas to a liquid state in two-thirds the top of the condenser instead of two-thirds the bottom of the condenser as in Conventional cooling systems and this in turn reduces the energy necessary to lead the process of cooling. The system cooling hybrid use with a capacity of 1 ton and Refrigerant type R22 and the value of current drawn by the system limits (3.9-4.2A), the same value of electric current calculated by the system are Conventional within this atmosphere of Iraq, and after taking different readings of the temperatures and pressure to several points in the system's found that the Refrigerant when it comes out of the compressor, it loses part of the temperature of the water in the solar collector through a heat exchanger while the literature published in accordance with the manufacturers that the solar collector, a kind of vacuum tubes contributes to raise the pressure and temperature of the fluid cooler to reduce the consumption of energy spent on compressor. Therefore, the system described by the current not fit for domestic use within the Iraqi environmental conditions.
Arts acts to reduce and exclude everything that is not necessary in the delivery of meaning, especially representative performance, which is based on the intensification of the physical and vocal actions, and in drawing the dimensions of the character. And because that, the artistic staff, among others in the ministry of education, are considered the cornerstone, in the development of theatrical activities in schools, this research came to find out the extent to which teachers in primary schools, in secondary schools and artistic supervisors rely on shorthand mechanisms in the representative performance.
The current research relied on the descriptive approach, in analyzing his sample, which was deliberately chosen, Among the most imp
Present investigation aimed to study plasma BNP hormone estimation as predictor of brain stroke and neurocognitive in relative with other limitations in CKD patient. The case control experimental study was conducted on CKD patient at Yarmuk Hospital at Baghdad Province, Iraq from February to April 2020. The results showed that there were significant variances (P< 0.05) between CKD patients and control group, there was significant increase in BNP hormone and cystatin-C levels at patient, while ihematological parameters were significantly decreased. The parameters of lipid profile were significantly increased (P<0.05). The result revealed that there was relationship between BNP hormone level and CKD. This support that BNP level is related wit
... Show Moreهدفت الدراسة إلى التعرف على مستوى تقييم الإعلاميين العراقيين المقيمين في الأردن لتغطية الإصلاحات السياسية و الاقتصادية في العراق من قبل الفضائيات العراقية. و هدفت كذلك إلى التعرف على الف
The research aims to highlight the significance and composition and the diversity of meanings and the Quranic context in the necessary and transgressive verbs in Surat (Abs).
This research consists of : a preamble , and two studies . The researcher addressed in the preliminary the importance of the phenomenon of necessity and infringement, the signs of the necessary action , the structure and controls of the act , the methods of infringement , its sections and signs.
As for the first topic : The researcher addressed the necessary verbs in Surat Abs , an applied study in terms of grammati
... Show More<p><strong>Objective: </strong>The aim of our study was to compare between flavonoids and phenolic acids contents of leaves and fruits of <em>Melia azedarach</em> since no phytochemical investigation had done previously in Iraq.</p><p><strong>Methods: </strong>The leaves and fruits of <em>Melia azedarach </em>were extracted by soxhlet using 80% ethanol then the dried extract was suspended in water and fractionated using petroleum ether, chloroform, ethyl acetate, and n-butanol. The n-butanol fraction was hydrolyzed by acid and partitioned with ethyl acetate. The different fractions containing flavonoids and phenolic acids were analyzed by HPLC and HPTLC.</p><
... Show MoreThe objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.
The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption
The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More