Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in conventional methods. The results showed satisfactory agreement with published papers. Also, the results of heating and cooling loads obtained revealed good agreement with those obtained from conventional methods when the soil heat gain is included. Two identical collectors in series of total area of 5.4m2 were employed as a heating system which provides an outlet air temperature of 30 o C at air mass flux of 0.06 kg/s.m2 at midday in January. While, a 65 oC outlet air temperature was achieved for the same mass flux at midday in August. The desiccant cooling system
was operated in five operating modes; the ventilation mode and four recirculation modes with 20%, 50%, 70%,and 90% recirculation. The simulation results showed that a regeneration temperature of 60-70 o C is satisfactory for a cool supply air temperature of about 19.5 o C. Also, it was noted that 20-30 % recirculation of return air would result in suitable indoor greenhouse conditions for most periods of system operation. In addition, the coefficient of performance COP of the system was high compared with the conventional vapor compression systems.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreالخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone
... Show MoreTo determine the abilities of salivary E‐cadherin to differentiate between periodontal health and periodontitis and to discriminate grades of periodontitis.
E‐cadherin is the main protein responsible for maintaining the integrity of epithelial‐barrier function. Disintegration of this protein is one of the events associated with the destructive forms of periodontal disease leading to increase concentration of E‐cadherin in the oral biofluids.
A total of 63 patients with periodontitis (case) and 35
Tannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by