Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors
The field of climatic geography focuses on the study of the Earth's surrounding atmosphere, particularly the lower (surface) part close to the Earth's surface. This field examines the interactions within the atmosphere resulting from the solar radiation that reaches the Earth and the subsequent distribution of atmospheric pressure. Consequently, certain surface pressure systems, both high and low, emerge and vary in their temporal and spatial impacts on the climate of the Arabian Peninsula. Therefore, it is essential to conduct a comprehensive and detailed study to understand the causes, development, movement, geographical distribution, and monthly and seasonal recurrence of these pressure systems. For this purpose, a minor climatic
... Show MoreThis study was designed to monitor the ambient air pollution in several sites within Baghdad City of Iraq. The readings started from May 2016 to April 2017. The highest concentration of sulfur dioxide (SO2) was 2.28 ppmm-3 while nitrogen dioxide (NO2) was 3.68 ppmm-3 and suspended particulate matter was 585.1 ?gm-3. This study also included estimating the value of the air pollution tolerance index (APTI) for four plant's species Olea europaea L., Ziziphus spina-Christi (L.) Desf, Albizia lebbeck(L.) Benth. and Eucalyptus camaldulensis Dehnh. Were cultivated on the road sides. The study includes four biochemical parameters, total chlorophyll content, ascorbic acid content, pH and relative water content of plant leaves. The results show that
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wi
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show More