The performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for performance evaluation. A 100 % ventilation mode and 3 recirculation modes, 30 % , 60 % and 100 % recirculation of room air. The concept of variable air volume was employed as a control strategy over the day, by changing the supply airflow rate to match the variation in the cooling load.
The results showed that the reduction in moisture content at regeneration temperatures from 55 o C to 75 o C lead to adequate removal of the high latent load in the meeting-hall. Also, the 30 % recirculation of return air resulted in comfortable indoor conditions satisfying the ventilation requirements for most periods of system operation. In addition, the COP of the system was high compared with the conventional vapor compression system. It varied from 1 to 13, when considering solar energy used to regenerate the
desiccant material as free energy.
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreIn this work, the annual behavior of critical frequency and electron density parameters of the ionosphere have been studied for the years (1989, 2001 and 2014) and (1986, 1996 and 2008) which represent the maximum and minimum of years in the solar cycles (22, 23 and 24) respectively. The annual behavior of (Ne, fo ) parameters have been investigated for different heights of Ionosphere layer (100 -1000) Km. The dataset was created both of critical frequency and electron density parameters by using the international reference ionosphere model (IRI-2016 model). This study showed result that during the maximum solar cycles the values of the (Ne) parameter change with
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe research work was conducted to investigate the effect of oral administration of water extract of black pepper at doses of (1, 5) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histopathological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of the all immunological parameters at both doses in comparison with control. Also obvious rais
... Show MoreAlgae have been used in different applications in various fields such as the pharmaceutical industry, environmental treatments, and biotechnology. Studies show that the preparation of nanoparticles by a green synthesis method is a promising solution to many medical and environmental issues. In the current study, the green alga Stigeoclonium attenuatum (Hazen) F.S. Collins 1909 was isolated and identified from the Al-Hillah River (Governorate of Babylon) in the middle of Iraq. The green synthesis by the aqueous extract of algae was used to prepare the nanoflakes of ZnO. Nanoflakes of ZnO are characterized by X-Ray diffraction (XRD) and scanning electron microscope (SEM) with flakes shape and dimensions ranging be
... Show More