In this paper, isobutane (R-600a) is used as a suitable substitute for (R-134a) when changing the length of capillary tube. And the experimental data on capillary tube are obtained under different conditions such as (subcooling and ambient temperatures) on domestic refrigerator (9ft3 size), this data shows that (R-600a) a suitable substitute for (R134a) .The test presented a model for a steady state, two-phase flow in capillary tube for vapour compression system .The numerical model depends on conservation equations (mass, energy and momentum) as wall as the equation of state for refrigerant. The solution methodology was implemented by using finite difference techniques. The system results indicate that it is possible to change the refrigeration system using (R-134a) by shorter capillary tube length about (28.6%) when using (R-600a) .The theoretical results for different variables such as(subcooling and ambient
temperatures) showed a good agreement with the "ASHRAE" tables and experimental results.
In The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims to identify the factors effecting the investigation of insurance fraud from the perspective of the National Insurance Company employees, by analyzing the study variables and make recommendations on how to enhance the company and employees performance, and to achieve the objectives of the study and test hypotheses a questionnaire was designed after referring to the international standards and the 1969 Iraqi punishment law, and it was answered by 20 employees that were approved for the purposes of this research and analysis.
The study found that lack of employee training was a strong factor, while the supervisory staff and operational procedures was a weak one.
G
... Show MoreThe existence of succession system has appeared in Arab Islamic state after the death of the prophet Mohammed (peace be upon God and peace), So there was caliphate, then the Umayyad dynasty in Syria , until 132 AH , the date o the emergence of the Abbasid state adopted a system ministry formally , hafs bin sulaiman ( Abu salamah Khallal ) was the first minister emerged on the political scene. He was killed at the time of the first Abbasid caliph , Abu Albbas , incest 132-136 who had put Khalid bin barmak as a minister instead of Hafs bin Sulaiman . During the reign of AL-Mansur 136-158 , there was an importance and a place for the ministry , despite of AL-Mansur strength personality that covered on his ministers personalities
... Show Moreshoulder joint by preparing special exercises for the youth-category wrestling, and through the researchers' follow-up to the wrestling game and their work in the field of rehabilitation and physical therapy, noticing that most of the wrestling players suffer from the shoulder joint pain despite their visit to the specialist doctor and take Treatment, so the researchers saw to study this problem and restore the recovery of the injured through special exercises and a suitable qualification program for the shoulder joint muscles, the goal of research in preparing special exercises and knowing its effect on the rehabilitation of the background muscle of the shoulder for the youth wrestling category. The researchers assumed that there are stati
... Show MoreIn this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method