Preferred Language
Articles
/
2RaWAowBVTCNdQwCf_W3
Comprehensive analysis of melting enhancement by circular Y-shaped fins in a vertical shell-and-tube heat storage system
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 04 2013
Journal Name
1st Post – Graduate Students Conference, Alnahrain University / College Of Engineering
Convection Heat Transfer in Horizontal Annulus Porous Media with Rotating Outer Cylinder
...Show More Authors

A numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay

... Show More
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Studying the effect of addition a composite of silanized Nano-Al2O3 and plasma treated polypropylene fibers on some physical and mechanical properties of heat cured PMMA denture base material
...Show More Authors

Background: Polymethyl methacrylate (PMMA) is the most commonly used material in denture fabrication. The material is far from ideal in fulfilling the mechanical requirements, like low impact and transverse strength, poor thermal conductivity. The purpose of this study was to evaluate the effect of addition a composite of surface treated Nano Aluminum oxide (Al2O3) filler and plasma treated polypropylene fiber (PP) on some properties of denture base material. Materials and methods: One hundred fifty prepared specimens were divided into 5 groups according to the tests, each group consisted of 30 specimens and these were subdivided into 3 groups (unreinforced heat cured acrylic resin as control group),reinforced acrylic resin with( 0.5%wt Nan

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 28 2013
Journal Name
Arabian Journal Of Geosciences
Facies analysis and geochemistry of the Euphrates Formation in Central Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Federated states of monks in the holy Quran (Study and analysis)
...Show More Authors

Thank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 02 2023
Journal Name
Alustath Journal For Human And Social Sciences
THE SEMANTIC ANALYSIS OF PHRASAL VERBS IN AMERICAN AND BRITISH TEXTS
...Show More Authors

Publication Date
Mon Apr 01 2019
Journal Name
International Journal Of Greenhouse Gas Control
CO2-wettability of sandstones exposed to traces of organic acids: Implications for CO2 geo-storage
...Show More Authors

Wettability of CO2-brine-mineral systems plays a vital role during geological CO2-storage. Residual trapping is lower in deep saline aquifers where the CO2 is migrating through quartz rich reservoirs but CO2 accumulation within a three-way structural closure would have a high storage volume due to higher CO2 saturation in hydrophobic quartz rich reservoir rock. However, such wettability is only poorly understood at realistic subsurface conditions, which are anoxic or reducing. As a consequence of the reducing environment, the geological formations (i.e. deep saline aquifers) contain appreciable concentrations of various organic acids. We thus demonstrate here what impact traces of organic acids exposed to storage rock have on their wettabil

... Show More
View Publication
Scopus (134)
Crossref (131)
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
A Recognition System for Subjects' Signature Using the Spatial Distribution of Signature Body
...Show More Authors

This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref