A mathematical model has been formulated to predict the influence of high outdoor air temperature on the performance of small scale air - conditioning system using R22 and alternative refrigerants R290, R407C, R410A. All refrigerants were investigated in the cooling mode operation. The mathematical model results have been validated with experimental data extracted from split type air conditioner of 2 TR capacity. This entailed the construction of an experimental test rig which consists of four main parts. They are, the refrigeration system, psychrometric test facility, measuring instrumentation, and auxiliary systems. The conditioned air was maintained at 25 0C dry bulb and 19 0C wet bulb for all tests. The outdoor ambient air temperature was varied from 35 0C to 55 0C in 5 0C increments. The study showed that R290 is the better replacement for R22 when the air conditioning system works under high ambient temperature. It has better performance as a drop in refrigerant. R407C has the closest performance to R22, followed by R410A.
A characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p
... Show MoreIn this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
The Isolated Combustion and Diluted Expansion (ICADE) internal combustion engine cycle combines the advantages of constant volume combustion of the Otto cycle with the high compression ratio of the Diesel cycle. This work studies the effect of isolated air mass (charge stratification) on the efficiency of the cycle; the analysis shows that the decrease of isolated air mass will increase the efficiency of the cycle and the large dilution air mass will quench all NOx forming reactions and reduce unburned hydrocarbons. Furthermore, the effect of Fuel / Air ratio on the efficiency shows that the increase of Fuel / Air ratio will increase efficiency of the cycle.
This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study aimed to develop scale of Selectiv Mutism with pupils of primary schools according to their teachers' view in Baghdad city (Karh and Resaf(.
Children might choose the mutism as the solution to avoid some psychological and social problems that surrounded them. Furthermore, this could consider as a disorder that could effect the child and led him to use the Selected Mutism.
This is supported by the pilot study which was conducted by the researcher on 150 teachers in different primary schools in Baghdad. The results revealed some symptoms were found with children who have selected mutism.
Because of there was no scale was found to measure the Selected Mutism, a scale was develop in order to measure t
... Show More