An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover all the variables that affect such type of transient mechanisms. The effect of the power density in
the primary circuit and the water flow reduction percentage on the average temperature build up of the
water in the primary circuit was investigated. The elapsed time required for the primary circuit average
temperature to reach a steady state value was also calculated. These calculations were supported with
experimental measurements conducted on a standard cross flow heat exchanger apparatus. The
experimental results were compared with the theoretical results for certain power density value at
different flow reduction percentages which show a reliable agreement. This relative agreement was
necessary to consider the mathematical model with certain assurance for calculating transient parameters
for higher power densities that are out of apparatus ranges. The results proved that water average
temperature build up in the primary circuit has sharp tendency when the percentage of flow reduction in
the secondary circuit reach 25% of its nominal values.
Objective: to identify the secondary school adolescent's obesity, and to find out the relationship between
adolescents obesity characteristics and their family history.
Methodology: A cross-sectional study was carried out among 537 adolescents (270 boys and 267 girls) aged 12-15
years selected by means of a multistage stratified random sampling technique.
Results: the prevalence of obesity among adolescents was 22.3%. (55.8%) of the obese adolescents were male,
(42.5%) their age is (13) years old, and (79.2%) of them coming from middle level of socio economic status score.
There are a significant relationship between obese adolescents and their family history of obesity which indicated
that obese father, and obese br
A new laboratory study conducted on stepped spillways in order to investigate their efficiency of dissipating flow energy. All previous study on stepped spillway indicated that the flow energy dissipation decreased as increasing in discharge. Increasing in the step numbers and the spillway slope led to energy dissipation decrease. In this study, an experimental attempt to increase energy dissipation at variable discharges was performed on stepped spillway and that leads to decreasing the cost of initiating the stilling basin or may be ignoring it. Five spillways were constructed from concrete and tested to investigate and compare among them. Three were roughed by gravel with different size for each one, one of them was s
... Show MoreThis study deals with the absence of state control over the whole of the Syrian geography in creating an environment conducive to the emergence of a new force represented by armed groups and organizations that point to fundamental changes in the conflict and to transform competition for control over the land into a struggle for influence. Which in itself represents the prospects of change in the Syrian scene, and that understanding their interests requires shedding light on the extent of the continuation of this competition and the conflict on land and expansion at the expense of the other, and thus contribute to complicate the Syrian scene, especially after attempts to bite Of land and annexation to each party's areas of influence, espe
... Show MoreThe current research aims to detect the level of suicidal tendencies among secondary school students in terms of gender and educational stage (intermediate school students and high school students). The researcher adopted Al Hafeez's (2017) scale for suicidal tendencies, it consists of (57) items including six domains, namely: suicidal ideation, social motives for suicide, tendency to self-harm, desire for death, indifference and pessimism about life, willingness to commit suicide. The scale was modified to be (42) items after it was exposed to a group of experts. The scale was applied to a sample of (200) male and female students from secondary schools in Baghdad Governorate (Karkh - Rusafa) for the academic year 2021-2022. The results
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Abstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show MoreHigh-resolution imaging of celestial bodies, especially the sun, is essential for understanding dynamic phenomena and surface details. However, the Earth's atmospheric turbulence distorts the incoming light wavefront, which poses a challenge for accurate solar imaging. Solar granulation, the formation of granules and intergranular lanes on the sun's surface, is important for studying solar activity. This paper investigates the impact of atmospheric turbulence-induced wavefront distortions on solar granule imaging and evaluates, both visually and statistically, the effectiveness of Zonal Adaptive Optics (AO) systems in correcting these distortions. Utilizing cellular automata for granulation modelling and Zonal AO correction methods,
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More