Intensifying the thermal response of PCM via fin-assisted foam strips in the shell-and-tube heat storage system
...Show More Authors
Abstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreMalaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
BACKGROUND: Acute appendicitis (AA) remains a complex case even for experienced surgeons. Rate of negative appendectomy is 5–40% and delayed intervention result in perforated appendicitis in 5–30% of cases. AIM: The aim of the study was to evaluate NPT as a marker for the diagnosis of AA concerning its severity. And compare the diagnostic value of it with the ALV scoring system. METHODS: One hundred twenty patients presented with signs and symptoms of AA and underwent appendectomy, only 84 patients proved to be AA by histopathological examination, were included in the study. Blood samples for neopterin (NPT) estimation and Alvarado (ALV) score was calculated. Control group consists of 45 healthy individual. RESULTS: NPT levels were s
... Show MoreThe region of Kirkuk and its surrounding areas, including (Baba, Jambour, Qara Chuq, Qaiyarah, Demir Dagh, Bai Hassan, Taq Taq, Makhul, Gilabat as well as southern Mosul and the cities of Erbil and Sulymania, are known as one of the oldest discovered oil fields in northern Iraq. This area presents a significant opportunity for further organic geochemical analysis to describe maturation zones and estimate economically generated hydrocarbons with particular reference to the Sargelu formation, to enhance hydrocarbons productivity. To assess the potential of these oil fields, it is essential to perform correlation, comparisons, and geochemical analyses of the data collected from exploration wells in the surrounding area. This appro
... Show More