The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy destruction method on the cooling tower. Experimental results showed a significant performance improvement when using packing on the CWCT. It can be observed that the thermal efficiency for the CWCT with packing under a heat exchanger and CWCT with packing above the heat exchanger are approximately 40% and 25% higher than that of the CWCT without packing respectively. As another part of the experiment results, it is indicated that the exergy destruction is directly proportional to air flow rate, cooling water flow rate, inlet cooling water flow rate and inlet Air Wet Bulb Temperature (AWBT) whereas, it is inversely proportional with spray water flow rate. In comparison with the cooling capacity of the tower, it was found that the exergy destruction approximately less than 20%. Exergy efficiency behavior is inversely proportional with the behavior of the exergy destruction. Empirical correlations are obtained to predict water film heat transfer coefficient and air-water mass transfer coefficient considering the influences of operational parameters.
Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MorePreparation and Characterization of Maleate, Tartarate,and Phthalate Modified Pectin
Abstract
Despite the fact of the importance and effectiveness of supporting the pricing policy for agriculture sector in Iraq, but this policy has stopped in supporting those agriculture production needs, and it was confined to support the final product only, and supporting the strategic corps exclusively after the U.S. Invasion in 2003, but after 2008 the state has returned to support some of this policy activities through providing financial loans through the agricultural initiative campaign, with trillions of iraqi dinars without any use, also providing support to some of the agricultural production needs such as fertilizers , tractors and agricultural combines, in addition supporting the pricing policy for the
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show More