In Iraq most of the small buildings deployed a conventional air conditioning technology which typically uses electrically driven compressor systems which exhibits several clear disadvantages such as high energy consumption, high electricity at peak loads. In this work a thermal performance of air conditioning system combined with a solar collector is investigated theoretically. The hybrid air conditioner consists of a semi hermetic compressor, water cooled shell and tube condenser, thermal expansion valve and coil with tank evaporator. The theoretical analysis included a simulation for the solar assisted air-conditioning system using EES software to analyze the effect of different parameters on the power consumption of c
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreSolar photovoltaic (PV) has many environmental benefits and it is considered to be a practical alternative to traditional energy generation. The electrical conversion efficiency of such systems is inherently limited due to the relatively high thermal resistance of the PV components. An approach for intensifying electrical and thermal production of air-type photovoltaic thermal (PVT) systems via applying a combination of fins and surface zigzags was proposed in this paper. This research study aims to apply three performance enhancers: case B, including internal fins; case C, back surface zigzags; and case D, combinations of fins and surface zigzags; whereas the baseline smooth duct rep
At a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.
Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show More