Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in conventional methods. The results showed satisfactory agreement with published papers. Also, the results of heating and cooling loads obtained revealed good agreement with those obtained from conventional methods when the soil heat gain is included. Two identical collectors in series of total area of 5.4m2 were employed as a heating system which provides an outlet air temperature of 30 o C at air mass flux of 0.06 kg/s.m2 at midday in January. While, a 65 oC outlet air temperature was achieved for the same mass flux at midday in August. The desiccant cooling system
was operated in five operating modes; the ventilation mode and four recirculation modes with 20%, 50%, 70%,and 90% recirculation. The simulation results showed that a regeneration temperature of 60-70 o C is satisfactory for a cool supply air temperature of about 19.5 o C. Also, it was noted that 20-30 % recirculation of return air would result in suitable indoor greenhouse conditions for most periods of system operation. In addition, the coefficient of performance COP of the system was high compared with the conventional vapor compression systems.
The purpose of this paper is to investigate the adaptations that have been made to traditional courtyard houses (TCHs) in Baghdad, Iraq. The aim is to develop an understanding of various factors in the adaptation of these buildings to suit contemporary lifestyles, which will contribute to the wider field of building adaptability.
Empirical evidence was collected through case studies of 12 TCHs in the Al-Kadhimiya area of Baghdad, which involved a physical survey of buildings and semi-structured interviews with 24 occupants.
The research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show Morephenomenon in the Arab women's contemporary literature, but it is rare in Iraqi women's
literature and falls short to the level of the phenomenon until now. Perhaps this is one of the
main reasons that caused the reluctance of researchers to study it, and this is probably the first
academic research in this field.
This research followed the discourse of Autobiography of women in Iraq, depending on the
two factors of charter and reference of the elements of Philippe Lejeune’s definition of the
genre of Autobiography, without focusing on narrative method, so it handled notes,
memories, diaries and biography of the other and counted all under the genre of the
Biography.
It came in three sections, the first follo
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
level of effectiveness of Glutathione - S - Transferees (GST), Glutathione peroxides (GPX),Malondialdehyde (MDA) the product of lipid peroxidation and some trace elements ( zinc,seleinum,iron ,copper ) had been measured in sera of (50) women with breast disease.which had been divided to : Control group (25),The first group (A) benign breast tumors (25),the second group (B) breast cancer (25). The results showed a clear moral high level of Glutathione - S - Transferees (GST), Glutathione peroxidase (GPX) , and Malondialdehyde (MDA) level in breast cancer group while a slight increase were observed in the levels of these enzymes and(MDA) in benign breast group. A significant reduction was evident in the levels of selenium and zinc
... Show MoreBackground: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis<