Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in conventional methods. The results showed satisfactory agreement with published papers. Also, the results of heating and cooling loads obtained revealed good agreement with those obtained from conventional methods when the soil heat gain is included. Two identical collectors in series of total area of 5.4m2 were employed as a heating system which provides an outlet air temperature of 30 o C at air mass flux of 0.06 kg/s.m2 at midday in January. While, a 65 oC outlet air temperature was achieved for the same mass flux at midday in August. The desiccant cooling system
was operated in five operating modes; the ventilation mode and four recirculation modes with 20%, 50%, 70%,and 90% recirculation. The simulation results showed that a regeneration temperature of 60-70 o C is satisfactory for a cool supply air temperature of about 19.5 o C. Also, it was noted that 20-30 % recirculation of return air would result in suitable indoor greenhouse conditions for most periods of system operation. In addition, the coefficient of performance COP of the system was high compared with the conventional vapor compression systems.
Since the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci
... Show MoreIdioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Gastroesophageal reflux disease (GERD) is a prevalent clinical condition, that affects millions of individuals worldwide. Objective: To assess the level of soluble HLA-E (sHLA-E) as a biomarker in the diagnosis and immunopathogenesis of GERD patients. Methods: The case-control prospective study included 40 GERD patients who were consulted at the Gastroenterology Unit of AlKindy Teaching Hospital, as along with 40 healthy control subjects. The study period extended from January 2023 to May 2024. Blood was drawn from both groups and serum was separated to assesssHLA-E using a sandwich enzyme-linked immunosorbent assay (ELISA) kit. Results: There was a statistically significant difference in sHLA-E levels between GERD patients and healthy cont
... Show MoreObtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreCharacterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:
-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for
... Show More