In a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amount of energy and current consumption of the two systems at the same operating conditions. The energy consumed and the current of the hybrid system were less than the traditional air-conditioning system by 12% and 28.6% respectively, which means that there is a saving in the energy and current consumption as a result of the use of the solar thermal collector.
The aim of present study was to develop solid and liquid self-microemulsifying drug delivery system of poorly water soluble drug mebendazole using Aerosil 200 as solid carrier. Microemulsions are clear, stable, isotropic liquid mixtures of oil, water and surfactant, frequently in combination with a co-surfactant having droplet size range usually in the range of 20-250 nm. Oleic acid, tween 80 and polypropylene glycol were selected as oil, surfactant and co-surfactant respectively and for preparation of stable SMEDDS, micro emulsion region was identified by constructing pseudo ternary phase diagram containing different proportion of surfactant: co-surfactant (1:1, 2:1 and 3:1), oil and water. In brief S/ CoS mix means su
... Show More This research aims to harmonize contemporary and traditional clothes, also expenses and savings. It is done by recycling evening clothes into Clothes with traditional features. The study followed descriptive explanatory approach. The sample consisted of seven dresses, as well as 208 female participants from Makkah Al-Mukarramah province, the age range was between 21 and 65 years old. An electronic questionnaire was distributed and the stability and reliability of the internal consistency were measured.
The research resulted in the ability to recycle evening dresses into modern clothes with traditional characteristics. It also confirmed that the reason of wearing traditional clothes is spirituality of the month of Ramadan. Addi
This Action research aimed at Assisting Students of Faculty of Educational Sciences at Al-Quds Open University to design computerized lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date , the researchers used focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t
... Show MoreThe issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.
And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came
... Show MoreThis paper compare the accurecy of HF propagation prediction programs for HF circuits links between Iraq and different points world wide during August 2018 when solar cycle 24 (start 2009 end 2020) is at minimun activity and also find out the best communication mode used. The prediction programs like Voice of America Coverage Analysis Program (VOACAP) and ITU Recommendation RS 533 (REC533 ) had been used to generat HF circuit link parameters like Maximum Usable Frequency ( MUF) and Frequency of Transsmision (FOT) .Depending on the predicted parameters (data) , real radio contacts had been done using a radio transceiver from Icom model IC 7100 with 100W RF
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show More