Preferred Language
Articles
/
joe-632
Exergy Analysis of a Domestic Refrigerator
...Show More Authors

An energy and exergy thermodynamic analysis using EES program was done for a domestic refrigerator working with R-134a using vapor compression refrigeration cycle. The analysis deals with the system component, i.e. compressor, condenser, evaporator and the expansion device. The analysis depends on the entropy generation minimization approach to improve the refrigerator performance by exploring the optimum design points. These design points were derived from three different theories governing the entropy generation minimization using exergy analyzing method. These theories were first applied to find the optimum balance between the hot inner condenser area and the cold inner evaporator area of the refrigerator and between its hot and cold thermal conductances. Nine types of condensers were used according to its internal surface area and thermal conductance, in order to reach the minimum entropy generation in the refrigerator. The results showed that the compressor has the lowest exergy efficiency of 25%. The expansion device was the second component after the compressor with exergy efficiency of 92%, followed by the condenser with an efficiency of 93%. The evaporator was found to have an exergy efficiency of 98 %. The experimental tests were repeated for the nine condensers sizes with three different ambient temperatures 25℃, 30℃ and 35℃.  The exergy analysis showed that the design of the refrigerator mainly depends on thermal conductance calculations rather than the surface inner area estimation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2023
Journal Name
International Journal Of Professional Business Review
Is It Possible To Adopt A Budget Of Performance In The Iraqi Government Companies?
...Show More Authors

Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met.   Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Oct 20 2016
Journal Name
Sociological Methods & Research
Mean Monte Carlo Finite Difference Method for Random Sampling of a Nonlinear Epidemic System
...Show More Authors

In this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained fo

... Show More
View Publication
Scopus (15)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Structural violence: A study In Johann Galtung's theory of explanation he violence t
...Show More Authors

This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
A Molecular Investigation of Phytoplasma (Candidatus Phytoplasma) Infecting Arabic Jasmine (Jasminum sambac) in Iraq
...Show More Authors

This study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
On modelling and adaptive control of a linear smart beam model interacting with fluid
...Show More Authors
Abstract<p>This paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi</p> ... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
The Effective M3Y Residual Interaction In 41Ca As a Nuclear Diffraction Grating of Electrons
...Show More Authors

The total and individual multipole moments of  magnetic electron scattering form factors in 41Ca  have been investigated using a widely successful model which is the nuclear shell model configurations keeping in mind of 1f7/2 subshell as an L-S shell and Millinar, Baymann, Zamick as L-S shell (F7MBZ) to give the model space  wave vector. Also, harmonic oscillator wave functions have been used as wave function of a single particle in 1f7/2  shell. Nucleus 40Ca as core closed and Core polarization effects have been used as a corrective with first order correction concept to basic computation of L-S shell and the excitement energy has been implemented with 2ћω. The

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Vacuum
Stability, electronic and vibrational properties of GaAlN wurtzoid molecules and nanocrystals: A DFT study
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Desulphurization of Simulated Oil Using SAPO-11 with CNT's as Adsorbent: A Kinetic Study
...Show More Authors

In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 cont

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Jun 19 2018
Journal Name
Elmofaker Review
The Secondary Liability of Electronic Auctions Arising from Contributory Trademark Infringement – A Comparative Study
...Show More Authors

Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit

... Show More
View Publication