An experimental study was carried out for an evaporative cooling system in order to investigate the effect of using an aluminum pad coated with fabric polyester. In the present work, it was considered to use a new different type of cooling medium and test its performance during the change in the wet-bulb temperature and dry-bulb temperature of the supply air outside of the pad, the relative humidity of the supply air, the amount of air supplied (300-600) CFM and also the change of the amount of circulated water (1.75, 2.5, 4.5) liter per minute. A decrease in the WBT of the air was obtained, whereas the WBT of the air entering the pad was 26.5 . In contrast, the WBT of the outside air had reached 23 even though evaporative cooling is an adiabatic process which makes the WBT of the air that comes out of the pad is equal to the entering air WBT. The decrease in DBT is by changing the amount of air and water passing through the aluminum pad, whereas the DBT of the air entering the pad was 45 , while the DBT of the outside air had reached 29 . Also, an essential thing was obtained as this rise in the relative humidity of the air is very small 57%RH compared to the conventional pads, and this gives a positive impression as the air supplied from this pad has less moisture and its ability to carry moisture is much higher than that of air supplied from other pads. This gives a positive impression because the air supplied from this pad has lower humidity and its ability to hold moisture much higher than the air supplied from other traditional pads.
Abstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreRheumatoid arthritis (RA) is a chronic inflammatory disease associated with decreased antioxidant state .This study aim to investigate the status of oxidant/antioxidant in a sample of Iraqi patients with RA and the role of peroxynitrite and its natural scavenger uric acid in them .This case-controlled study was conducted at Baghdad teaching hospital /Baghdad from December 2010-May 2011 . Twenty-five patients with mean age 39 years and 25 apparently healthy subject as controls with mean age 29 years were included in the study .Investigations include estimation of serum levels of nitric oxide (NO) ,peroxynitrite (PN) , malondialdehyde (MDA) , and uric acid (UA) .Serum PN levels were significantly elevated in RA patients a
... Show MoreNumerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density
... Show MoreThis study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.
nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h