A mathematical model has been formulated to predict the influence of high outdoor air temperature on the performance of small scale air - conditioning system using R22 and alternative refrigerants R290, R407C, R410A. All refrigerants were investigated in the cooling mode operation. The mathematical model results have been validated with experimental data extracted from split type air conditioner of 2 TR capacity. This entailed the construction of an experimental test rig which consists of four main parts. They are, the refrigeration system, psychrometric test facility, measuring instrumentation, and auxiliary systems. The conditioned air was maintained at 25 0C dry bulb and 19 0C wet bulb for all tests. The outdoor ambient air temperature was varied from 35 0C to 55 0C in 5 0C increments. The study showed that R290 is the better replacement for R22 when the air conditioning system works under high ambient temperature. It has better performance as a drop in refrigerant. R407C has the closest performance to R22, followed by R410A.
Iraqi provinces suffer many of the environmental problems, appear explained these problems in the city of Basra, Basra, the largest province and is among Iraq's provinces in the annexation of oil fields, which is experiencing an oil production operations of large, it suffers from the burning of gas associated with oil extraction resulting in the emission severe gas process including toxic hydrogen sulfide gas (h2S) and oxides of carbon, sulfur and nitrogen in addition to the release of toxic metal elements such as mercury, arsenic, vanadium, which caused the man many serious diseases. , And perhaps one of the most important of these problems are worsening air quality and increasing cases of air pollution and the deterioration of the qual
... Show MoreThe research aims to identify the educational values prevailing in the small kinetic games for the children of Riyadh, and to categorize the educational values of the kinetic games small children Riyadh. The research analyzed the content of a number of small kinetic games that included studied physical education at the two pre-kindergarten and stipulated by the Platform for kindergartens, which is being applied. The content analysis was used by analysts agreement with themselves over time (21) days. The agreement between the external researcher and analyst. The researcher used the Cooper to extract equation lab agreement between the researcher and the outside analyst, has reached agreement on determining factor idea and label values (0.8
... Show MoreThe aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreIn this paper, we investigate the behavior of the bayes estimators, for the scale parameter of the Gompertz distribution under two different loss functions such as, the squared error loss function, the exponential loss function (proposed), based different double prior distributions represented as erlang with inverse levy prior, erlang with non-informative prior, inverse levy with non-informative prior and erlang with chi-square prior.
The simulation method was fulfilled to obtain the results, including the estimated values and the mean square error (MSE) for the scale parameter of the Gompertz distribution, for different cases for the scale parameter of the Gompertz distr
... Show MoreSixteen species of Armored Scale insects were recorded from Baghdad city during 2001-2005. Three of these are reported here for the first time Abgrallaspis cyanophylli (Signoret, 1869), Aonidiella citrina (Craw,1870) and Chrysomphalus aonidium (Linnaeus,1758). The other thirteen species were recorded earlier Aonidiella aurantii (Maskell), Aonidiella orientalis (Newstead), Chrysomphalus dictyospermi (Morgan), Diaspidiotus ostreaeformis (Curtis), Diaspidiotu perniciosus (Comctock), Hemiberlesia lataniae (Signoret), Lepidosaphes beckii (Newman), Lepidosaphes conchiformis (Gmelin), Lepidosaphes ulmi (Linnaeus), Mercetaspis halli
... Show More