The present paper deals with experimental investigation of the performance of air cooled split air conditioner, with evaporative water mist pre cooling to increase the cooling capacity and reduce the consumption power under hot and dry climate. This investigation considers how the performance can be enhanced by using water mist to pre-cool ambient air entering the condensers by adiabatic cooling process which depends on the ambient air wet bulb temperature; as well the condensing temperature and condensing pressure will be decreased accordingly. So the cooling capacity would be increased and consumption power would be decreased, consequently the energy ratio, EER would be improved. The performance of air cooled air conditioner with water mist pre cooling;
ECAC was compared to the performance of air cooled air conditioner, ACAC which tested under the same ambient condition that is ranged from 25 oC to 52 oC. Test results show that ECAC operating at EER of 10.5 BTV/W. The ECAC had an EER of 47 % higher than that of ACAC under the same and most serve hot and dry condition of 52 oC and 10% relative humidity.
Spatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.
APFS Mohammed, 2014
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
A simple , sensitive and accurate spectrophotometric method for the trace determination of bismuth (III) has been developed .This method is based on the reaction of bismuth (III) with arsenazo(III) in acid solution (pH=1.9) to form a blue water soluble complex which exhibits maximum absorption at 612nm .Beer's law is obeyed over the concentration range of 2-85 ?g bismuth (III) in a final volume of 20 mL( i.e. 0.1 – 4.25?g.mL-1) with a correlation coefficient of (0.9981) and molar absorptivity 1.9×104 L.mol-1.cm-1 . The limit of detection (LOD) and the limit of quantification (LOQ) are 0.0633 and 0.0847 ?g.mL-1 , respectively . Under optimum conditions,the stoichiometry of the reaction between bismuth (III) and arsenazo(III) r
... Show MoreThis research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p
... Show MoreAn experimental and numerical investigation of the effect of using two types of nanofluids with suspending of (Al2O3 and CuO) nanoparticles in deionized water with a volume fraction of (0.1% vol.), in addition to use three types of fin plate configurations of (smooth, perforated, and dimple plate) to study the heat transfer enhancement characteristics of commercial fin plate heat sink for cooling computer processing unit. All experimental tests under simulated conditions by using heat flux heater element with input power range of (5, 16, 35, 70, and 100 W). The experimental parameters calculated are such as water and nanofluid as coolant with Reynolds number of (7000, 8000, 9400 and 11300); the air
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More