The need for renewable energy sources is higher than ever due to rising global warming, climate change, and ozone depletion. For refrigeration and air conditioning applications, adsorption refrigeration systems are viable alternatives cooling techniques. This study is a topic and part of the M.Sc. thesis. A field solar-powered ice maker unit was created, studied, tested, and evaluated on the 13th and 30th of May, 2022. Activated carbon and methanol pair was used to set up a refrigeration system in Baghdad (Al Dora). Experimental tests were carried out outdoors to determine the coefficient of performance COP and specific cooling power SCP of the system. The results showed that the lowest temperature obtained at the evaporative surface was (4 oC) and (3 oC) for the 13th and 30th of May, respectively, at the opening time of the valve between the evaporator and the generator at 9 pm. In addition, the amounts of methanol condensate were (0.340 kg) and (0.344 kg) for the 13th and 30th of May, respectively, while the maximum cycle coefficient of performance (COP) and specific cooling power SCP are about 0.57 and 0.14 kW/kga.c , respectively
The present study intends to prepare nanofibers mat of polyacrylonitrile by electrospinning technique and investigates their adsorption capacity to Congo red dye from the aqueous solution, after characterize it by different techniques such as FTIR, SEM, EDA, XRD and BET. The influence factors on adsorption were studied including adsorbent dosage, initial concentration, contact time, pH and ionic strength. The results confirmed that the increasing in pH decreases the adsorption capacity. So, the optimum adsorbent dosage, initial concentration and contact time were 0.006 g, 25 mg/L and 150 min respectively. The isotherm models of Freundlich and Langmuir were applied on the experimental adsorption data to evaluate the maximum capacity and ener
... Show MoreThe corrosion inhibiting properties of the new furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione in acidic solution (1.0 M HCl) were explored utilizing electrochemical, surface morphology (AFM), and quantum chemical calculations approaches. The novel furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione shows with an inhibitory efficiency value of 99.4 percent at 150 ppm, carbon steel corrosion in acidic medium is effectively inhibited, according to the results. The influence of temperature on corrosion prevention was studied using adsorption parameters and activation thermodynamics. The novel furan derivative creates a protective layer over the metallic surfa
... Show MoreReaxys Chemistry database information SciVal Topics Metrics Abstract A novel CoO–ZnO nanocomposite was synthesized by the photo irradiation method using a solution of cobalt and zinc complexes and used as a coating applied by electrophoretic deposition (EPD) for corrosion protection of stainless steel (SS) in saline solution. The samples were characterized using powder XRD, scanning electron microscopy (SEM) and electrochemical polarization. It was also found that the coating was still stable after conducting the corrosion test: it contained no cracks and CoO–ZnO nanocomposites clearly appeared on the surface. SEM showed that the significant surface cracking disappeared. XRD confirmed that CoO–ZnO nanocomposites comprised CoO and Zn
... Show MoreIn the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show More— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b