Experimental investigations of the performance of a flat-plate solar collector using carbon and metal oxides based nanofluids
...Show More Authors
The aim of this study is to understand the effect of addition carbon types on aluminum electrical conductivity which used three fillers of carbon reinforced aluminum at different weight fractions. The experimental results showed that electrical conductivity of aluminum was decreased by the addition all carbon types, also at low weight fraction of carbon black; it reached (4.53S/cm), whereas it was appeared highly increasing for each carbon fiber and synthetic graphite. At (45%) weight fraction the electrical conductivity was decreased to (4.36Scm) and (4.27Scm) for each carbon fiber and synthetic graphite, respectively. While it was reached to maximum value with carbon black. Hybrid composites were investigated also; the results exhibit tha
... Show MoreThe current work studies the effect of adding chopped carbon fiber (CCF) on gypsum plaster properties (precisely the compressive strength and the modulus of rupture). The research plan consists of using six mixes of gypsum plaster; these mixes are divided into two groups according to the (Water/Gypsum) ratios (0.5 & 0.6). Each group was divided into three subgroups according to CCF volume fraction (Vf): 0.0%, 0.2% and 0.4%. Three cubic (50×50×50) mm and three prismatic (40×40×160) mm samples were performed for each mix. It was found that, the addition of CCF to the gypsum plaster mixes increases both the compressive strength and the modulus of rupture for both (W/G) ratios, an
Abstract
The aim of the research is to clarify the requirements of the qualification of the external auditor in Iraq and the extent of their impact on the quality of the professional performance of the audit process. The research was based on analyzing the results of the questionnaire prepared for the impact of qualifications on the quality of professional performance. The researcher has reached a number of conclusions, the most important of which is that a highly qualified and unethical auditor has a greater negative impact on the quality of professional performance than those with low qualifications. The most important recommendations of the research were the need to pay
... Show MoreThe research utilizes data produced by the Local Urban Management Directorate in Najaf and the imagery data from the Landsat 9 satellite, after being processed by the GIS tool. The research follows a descriptive and analytical approach; we integrated the Markov chain analysis and the cellular automation approach to predict transformations in city structure as a result of changes in land utilization. The research also aims to identify approaches to detect post-classification transformations in order to determine changes in land utilization. To predict the future land utilization in the city of Kufa, and to evaluate data accuracy, we used the Kappa Indicator to determine the potential applicability of the probability matrix that resulted from
... Show MoreTwo- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.
The phenyl hydrazine was react readily with acetic acid chloride in [1:2] ratio in alkyl of ethanolic solution, and refluxe for five hours to produce a new ligand of (N-Carboxymethyl-N-phenyl-hydrazino)-acetic acid [H2L].
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreSemantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po
Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show More