In this work, a flat-plate solar air heater (FSAH) and a tubular solar air heater (TSAH) were designed and tested numerically. The work investigates the effect of increasing the contact area between the flowing air and the absorber surface of each heater and predicts the expected results before the fabrication of the experimental rig. Three-dimensional two models were designed and simulated by the ANSYS-FLUENT 16 Program. The solar irradiation and ambient air temperature were measured experimentally on December 1st 2022, at the weather conditions of Baghdad City- Iraq, at three air mass flow rates, 0.012 kg/s, 0.032 kg/s, and 0.052 kg/s. The numerical results showed the advantage in the thermal performance of the TSAH in comparison to the FSAH, represented by better air temperature difference, better heat transfer from the absorber to air, and better thermal efficiency. The TSAH has a higher thermal efficiency than the FSAH by 7 %, 19 % °C, and 22 % at 0.012 kg/s, 0.032 kg/s, and 0.052 kg/s, respectively. The improvement of the thermal characteristics of the TSAH can be referred to as the increment in the heat transfer contact area between the absorber and the flowing air.
Background: Saliva is a specific bio-fluid with important biomarkers. Analyzing any alternation in these markers could give valuable information, in relation to oral health status parameters. The aim of this study was to investigate the level of α -amylase in unstimulated whole saliva of healthy, primary school children in relation to some oral health parameters. Materials and Methods: A questionnaires consisted of demography and medical histories of participants were filled by children families. Saliva samples were collected for 5- minutes between 9:00 -11:00 AM from 114 healthy students aged 6-13 years, divided into four age groups. Flow- rate, Plaque and Gingival Index were assessed and dentition status was investigated by DMFT/dmft
... Show MoreThis research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended
... Show MoreThis research aims to test the relationship between "relational leadership as an independent variable and organizational energy as a dependent variable. The current research variables are among the recent and important variables for the development of organizations, and for the purpose of explaining the relationship and influence between the variables, a set of goals has been formulated, including providing the interested and scientific and theoretical information explaining the nature of the variables The research, and the extent to which its causes are reflected in the research sample to increase the interest of the research organization’s organization and make it more appropriate to the required performance in light of a cha
... Show MoreBackground: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More