PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f
In this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreAdolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
Computational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i
... Show More
