Preferred Language
Articles
/
joe-733
Experimental Study on Double-Pass Solar Air Heater with and without using Phase Change Material
...Show More Authors

In this paper, an experimental study was conducted to enhance the thermal performance of a double-pass solar air heater (SAH) using phase change material (PCM) for thermal storage at climatic conditions of Baghdad city - Iraq. The double-pass solar air heater integrated with thermal storage system was manufactured and tested to ensure that the air heating reserved after the absence of the sun. The rectangular cavity filled with paraffin wax was used as a latent heat storage and incorporated into the lower channel of solar air heater. Experiments were carried out to evaluate the charging and discharging characteristics of two similar designed solar air collectors with and without using phase change material at a constant air mass flow rate of (0.0375 kg/sec). The parameters that affect the thermal performance of the SAH with and without the PCMs presented by solar radiation, the difference in air temperature, outlet air temperature, instantaneous thermal efficiency, and daily efficiency are evaluated. The experimental results show that when using the PCM, the temperature of the outlet air was enhanced and increased over the ambient temperature by (1.5 - 6.5 C) after sunset for 5 hours period. It was found that the instantaneous thermal efficiency of the heater using thermal storage exceeds 100% after sunset, this is due to a large amount of heat stored in the paraffin wax that has been released during the discharge process. Also, it was found that the daily efficiency of the double pass SAH integrated with and without thermal energy storage unit was (56, 47%) respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fiberewise Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.

Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
ON CERTAIN SUB-SPACE OF X
...Show More Authors

The study of properties of space of entire functions of several complex variables was initiated by Kamthan [4] using the topological properties of the space. We have introduced in this paper the sub-space of space of entire functions of several complex variables which is studied by Kamthan.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Nternational Journal Of Mathematics Trends And Technology (ijmtt)
Fuzzy Scheduling Problem on Two Machines
...Show More Authors

Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Video effect on Youths Value
...Show More Authors

The Video effect on Youths Value

View Publication Preview PDF
Publication Date
Sun Jan 07 2018
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
On Topological Structures In Graph Theory
...Show More Authors

In this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological

... Show More
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
On the Representations of M-Groups
...Show More Authors

The main object of this paper is to study the representations of monomial groups and characters technique for representations of monomial groups. We refer to monomial groups by M-groups. Moreover we investigate the relation of monomial groups and solvable groups. Many applications have been given the symbol G e.g. group of order 297 is an M-group and solvable. For any group G, the factor group G/G? (G? is the derived subgroup of G) is an M-group in particular if G = Sn, SL(4,R).

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
2012 Ieee International Conference On Circuits And Systems (iccas)
A survey of on-chip monitors
...Show More Authors

Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref