In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperature difference of air between inlet and outlet sections observed on (0.018 kg/s) air mass flow rate were exceeded (17°C) and the maximum outlet temperature that got was exceeded (34°C) for the three months (December, January and February) of experiments. Average efficiency was ranged from 53% to 65%. In the case of storage and then operating, the maximum outlet air temperature was ranged from (27°C) up to (31°C) then
decreased with spend of energy to reach (13°C) to (18°C) and the maximum storage energy was (165.14 W) for the porosity of (0.29) , height of (20 cm) and (0.01 kg/s) mass flow rate. The results also, showed that the solar air collector supplied a solar heating fraction (SHF) with an average of (0.65) for a meeting room (3 * 4 * 7 m) located in Baghdad as a case study.
This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
يسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال
In this work, Pure and Cu: doped titanium dioxide nano-powder was prepared through a solid-state method. the dopant concentration [Cu/TiO2 in atomic percentage (wt%)] is derived from 0 to 7 wt.%. structural properties of the samples performed with XRD revealed all nanopowders are of titanium dioxide having polycrystalline nature. Physical and Morphological studies were conducted using a scanning electronic microscope SEM test instrument to confirm the grain size and texture. The other properties of samples were examined using an optical microscope, Lee's Disc, Shore D hardness instrument, Fourier-transform infrared spectroscopy (FTIR), and Energy-dispersive X-ray spectroscopy (EDX). Results showed that the thermal conductivity
... Show MoreThis paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data. It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t
... Show MoreSamples of the ovary and uterus of local breed cats used to investigate the histological, histometrical and hormonal features. The paraffin embedding technique was used for processing of tissue that stained by hematoxyline and eosin stain, and massons trichrom stain. Ovary of at proestrus or oestrus phases composed of outer cortex that covered by cuboidal germinal epithelium and inner medulla. Tunica albuginea composed of a thin layer of characterized by fusiform stromal cells. The cortex content groups of Oogonial cells, numerous primordial follicles, little primary, secondary and tertiary follicles in addition for 1-2 follicular cysts and mature corpus letium. In pregnant cat the thickness of ovarian cortex was significantly incre
... Show MoreThis paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MoreAn adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show More