The sun which is all energy sources, in today's society, hot water is used for various purposes starting from household to power production. People are adopting various ways to accomplish these goals, such as firewood heat and electrical power, so solar energy is an alternative to the dwindling resources of fossil fuels. Conversion of solar radiation into heat is one of the simplest and most direct applications of this energy, it can be used to heat water systems. A widely used flat-plate solar collector. In this study we have come to heat water using solar energy. This research presents the design and experimental analysis for using Spiral Flow Solar Water Heater (SFSWH) to enhance the thermal efficiency of a flat plate solar collector. Where a solar water heater consists of a copper tube in the shape of a spiral is fixed on an iron flat plate as an absorber. The experiment also includes the selection quality of the paint used to dye the absorbent surface. In May at Fallujah (33.34ºN, 43.8ºE), the thermal performance was calculated. The maximum temperature difference in the storage tank of about 18 ℃ for (SFSWH) during the experimental time was obtained. The efficiency of the collector was obtained is about (80.11%). Where it gives an increase (40 %) in its efficiency compared to published values.
The current study aimed to identify the morphological description of the domestic cat tongue; thus for this purpose, five domestic cats of both sexes were collected from the local markets of Baghdad governorate, and then the animals were anesthetized and the tongue was removed from them. Fresh tongue samples were fixed using formalin (10%), and the preserved samples were dyed with methyl blue. The results showed that the tongue is an elongated organ divided into three regions: a somewhat flat rounded apex, this region contains a central depression called the middle groove. The second region is the lingual body region represents the largest region of the tongue, whereas its last region, called the root which has a lingual prominence on it
... Show MoreDomestic violence, or as sometimes known as family abuse, is usually related to a domestic or local setting as in cohabitation or in marriage. It can take the forms of being physical, verbal, economic or emotional. Globally, most of the domestic violence is overwhelmingly directed to females as they tend to experience and receive severe forms of violence, most likely because they do not involve their intimate, or sometimes even non-intimate partners, in the process of mental and physical self-defense.
Sometimes countries justify domestic violence directed to females, they may be leg
... Show MoreObjective : A descriptive analytical study was conducted on pregnant women who face domestic
violence and receive antenatal services from obstetric wards ikou^V Ctemal ^4M^vrAd\vQ^Ms> "&
Baghdad city, to identify the types of domestic violence on pregnant woman.
Methodology : A purposive sample of one hundred pregnant women with domestic violence was
selected. Data were collected through questionnaire, the period extended from the 20th Feb to the 3rd
May 2006. Descriptive and inferential statistical procedures were used to analyze the data.
Results : The result of the study showed that the highest percentage (26%) of the study sample their
age ranges from (30 - 34) years, most of them were housewife with low s
L-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 d
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreThe purpose of this work is to clarify the effect of the Active Galactic Nucleus (AGN) on the properties of the galaxy. A photometric study of two galaxies by surface optical measurements techniques and by using'griz filters' was performed. The scientific material that used in this work was obtained from ''SLOAN DIGITAL SKY SURVEY'' (DR7), a fuzzy color, contour maps, photometric parameters, and color indices were studied by using surface photometric technique. The work was done by Ellipse task in IRAF (Image Reduction and Analysis Facility) software from the National Optical Astronomy Observatory (NOAO).
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More