In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperature difference of air between inlet and outlet sections observed on (0.018 kg/s) air mass flow rate were exceeded (17°C) and the maximum outlet temperature that got was exceeded (34°C) for the three months (December, January and February) of experiments. Average efficiency was ranged from 53% to 65%. In the case of storage and then operating, the maximum outlet air temperature was ranged from (27°C) up to (31°C) then
decreased with spend of energy to reach (13°C) to (18°C) and the maximum storage energy was (165.14 W) for the porosity of (0.29) , height of (20 cm) and (0.01 kg/s) mass flow rate. The results also, showed that the solar air collector supplied a solar heating fraction (SHF) with an average of (0.65) for a meeting room (3 * 4 * 7 m) located in Baghdad as a case study.
|
The prevalence of gastrointestinal symptoms of COVID-19 is variable with different types of presentations. Some of them many present with manifestations mimicking surgical emergencies. Yet, the pathophysiology of acute abdomen in the context of COVID-19 remains unclear. We present a case of a previously healthy child who presented with acute appendicitis with multisystemic inflammatory syndrome. We also highlight the necessity of considering the gastrointestinal symptoms of COVID-19 infection in pediatric patients in order to avoid misdiagnosis and further complications. |
Our aim was to investigate the inclusion of sexual and reproductive health and rights (SRHR) topics in medical curricula and the perceived need for, feasibility of, and barriers to teaching SRHR. We distributed a survey with questions on SRHR content, and factors regulating SRHR content, to medical universities worldwide using chain referral. Associations between high SRHR content and independent variables were analyzed using unconditional linear regression or χ2 test. Text data were analyzed by thematic analysis. We collected data from 219 respondents, 143 universities and 54 countries. Clinical SRHR topics such as safe pregnancy and childbirth (95.7%) and contraceptive methods
Iraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.
Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re
Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perin
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show More