Generally fossil based fuels are used in internal combustion engines as an energy source.
Excessive use of fossil based fuels diminishes present reserves and increases the air pollution in
urban areas. This enhances the importance of the effective use of present reserves and/or to develop
new alternative fuels, which are environment friendly. Use of alternative fuel is a way of emission
control. The term “Alternative Gaseous Fuels” relates to a wide range of fuels that are in the
gaseous state at ambient conditions, whether when used on their own or as components of mixtures
with other fuels.
In this study, a single cylinder diesel engine was modified to use LPG in dual fuel mode to study
the performance, emission, and combustion characteristics. The primary fuel, liquefied petroleum
gas (LPG), was mixed with air, compressed, and ignited by a small pilot spray of diesel. Dual fuel
engine showed a reduction in oxides of nitrogen in the entire load range. The brake thermal
efficiency improved by 3% in dual fuel mode, especially at low load, and also reduced the
hydrocarbon, carbon monoxide, and CO2 emissions.
This research deals with what so called concept of The Human Model and how Iraqi Media concerns of this concept practically as it plays a key role in attracting readers, on the first hand. On the second, it is important to shed light on the scientific desire of the Iraqi Media and how it deals with this contemporary trend especially in editorial media.
The importance of the research stems from the fact that it alerts to a new stream of modern trends in journalistic writing, according to many modern Arab and foreign media studies; and to the importance of employing human modeling in dealing with facts, events, issues and problems in various editorial arts within their effective influence in concilia
... Show MoreMicrobial fuel cell is a device that uses the microorganism metabolism for the production of electricity under specific operating conditions. Double chamber microbial fuel cell was tested for the use of two cheap electrode materials copper and aluminum for the production of electricity under different operating conditions. The investigated conditions were concentration of microorganism (yeast) (0.5- 2 g/l), solutions temperature (33-45 oC) and concentration of glucose as a substrate (1.5- 6 g/l). The results demonstrated that copper electrode exhibit good performance while the performance of aluminum is poor. The electricity is generated with and without the addition of substrate. Addition of glucose substrate
... Show MoreThyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More