The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider
... Show MoreA study worthy of study and objective analysis of the relationship of formal synthesis and innovative effectiveness in the design of modern women's fabrics, which deals with the first chapter the problem of research based on the following questions: (What role of innovative thinking in the formal synthesis of women's clothing designs Modern)
The research objectives included the following:
1 - defines the concept of innovative thinking and its effectiveness in design
2 - Reveal the role of innovative thinking in the formal synthesis of the designs of modern women's fabrics
The theoretical framework which included the following parts:.
1 - Innovative thinkin
... Show MoreEnd of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the struct
... Show MoreThe main objective of this study is to introduce a systematic design procedure for short-span segmental beams following a sophisticated ACI 440.2R-17 design procedure. The general aspects of innovative short-span segmental beams are easy to fabricate, economical and rapidly placed in pre-specified positions. Short-span segmental beams fabricated from individual precast plain-concrete blocks and CFRP plates. Recently, experimental tests performed on short-span segmental beams, by the authors, investigated CFRP plate-bonding, CFRP plate cross-sectional area, the thickness of plate-bonding epoxy resin, surface-to-surface condition of concrete blocks, as well as, interface condition of the bonding surface. The experimental program comprises tes
... Show MoreSince his first existence on earth, human had formed a connecting link for a regressive, kinetic and developed relationship that comes from a semi-complicated interaction between natural environment and constructed environment, and this resulted in the survival of human and his existence continuance. Constructed environment enabled human to survive the natural environment inconstancies and enemies as predators, also it helped him to feel safe, comfortable and to practice his everyday life activities...etc. This alternative interaction resulted in creating a civilized legacy for a group of landmarks that tell about the development of this relationship by elemental output that reached us either by documents and manuscripts or as an existed
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreSpatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south
... Show More3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D mo
... Show More