Performance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigate root cause analysis on Windows 10 Home 20H2, core i5 processor with 4 cores and 8GB of RAM. After simulating workload to get a performance issue, that makes the system and application get unresponsive, then using Windows Performance Toolkit WPT to trace and analyze the event log for root cause investigation. Our results demonstrate analysis works using WPT for decision making such as the reasons of underutilization on CPU and disk, labeling the highlighted patterns, the unbalanced use of system calls in memory, and deciding that the usage preview is the best way to get an idea about applications behavior inside Windows systems resources. Overall improving resources utilization usage and identifying the cause of slowing memory allocation, inefficient disk usage, and throughput.
To create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% vo
... Show MoreIn the hybrid coolingsolar systems , a solar collectoris used to convertsolar energy intoheat sourcein order to super heat therefrigerant leave thecompressor,andthisprocess helpsin the transformation ofrefrigerant state from gaseous statetothe liquid statein upper two-thirdsof thecondenserinstead of the lower two-thirdssuchas in thetraditional air-conditioning systems and this willreduce theenergyneeded torun the process ofcooling.In this research two hybrid air-conditioning system with an evacuated tube solar collector were used, therefrigerant was R22 and the capacity was 2 tons each.The tilt angle of the evacuated tube solar collector was changed and the solar collector fluid was replaced into oil instead of water.A comparison wasi
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreModern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreThis paper proposes a novel finite-time generalized proportional integral observer (FTGPIO) based a sliding mode control (SMC) scheme for the tracking control problem of high order uncertain systems subject to fast time-varying disturbances. For this purpose, the construction of the controller consists of two consecutive steps. First, the novel FTGPIO is designed to observe unmeasurable plant dynamics states and disturbance with its higher time derivatives in finite time rather than infinite time as in the standard GPIO. In the FTGPO estimator, the finite time convergence rate of estimations is well achieved, whereas the convergence rate of estimations by classical GPIO is asymptotic and slow. Secondly, on the basis of the finite and fast e
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThe corrosion of metals is of great economic importance. Estimates show that the quarter of the iron and the steel produced is destroyed in this way. Rubber lining has been used for severe corrosion protection because NR and certain synthetic rubbers have a basic resistance to the very corrosive chemicals particularly acids. The present work includes producing ebonite from both natural and synthetic rubbers ; therefore, the following materials were chosen to produce ebonite rubber: a) Natural rubber (NR). b) Styrene butadiene rubber (SBR). c) Nitrile rubber (NBR). d) Neoprene rubber (CR) [WRT]. The best ebonite vulcanizates are obtained in the presence of 30 Pphr sulfur, and carbon black as reinforcing filler. The relation between
... Show MoreAbstract:
The aim of this research to try to determine the type of expected relationship between inflation as the explanatory variable and market performance as a dependent variable, for that used data issued and published by the Central Bank of Iraq and the Iraqi Stock Exchange for a sample consisting of (159) observations using the intentional or intentional sampling method for the period extending between the months (January 2010 to March 2023), in the light of each of the Consumer Price Index (CPI), the Iraqi Stock Exchange Index, the number of traded shares and the number of market capital shares to ex
... Show MoreThe genetic toxicity of aqueous and alcoholic extracts of seeds of Peganum harmala L. was evaluated on the onion roots ,using concentrations 10,25,50,100 and 200 % w/v of extracts and periods of exposure 24,48 and 74 hours. The results indicated that the Peganum harmala significantly decreased root growth rate of onion root at all concentrations and treatment periods in comparison to the control , the growth of the root decreased when increasing the extract concentration.The EC50value of aqueous extracts was 50% and for alcohol extract was 25% ,thus the alcohol extract was most effective in the growth rate of the roots from the aqueous extract. The results also indicated that the mitotic index of Allium cepa was signifi
... Show More