Preferred Language
Articles
/
VIYt1YYBIXToZYALTrUv
Efficient thermal management of the photovoltaic/phase change material system with innovative exterior metal-foam layer
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dynamics of a single Condensing Two-Phase Bubble
...Show More Authors

The dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.

View Publication Preview PDF
Publication Date
Thu May 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Shear bond strength of endodontic sealers to dentin with and without smear layer and gutta percha (An in vitro study)
...Show More Authors

Background: The bond strength of root canal sealers to dentin and gutta-percha seems to be an important property for maintaining the stability of root canal filling, which potentially influences both leakage and root strength. The objective of this, in vitro, study was to evaluate the shear bond strength of three different endodontic sealers (Gutta-Flow, AH Plus, Apexit Plus) to dentin, in the presence and absence of the smear layer and gutta percha. Material and Methods: After slicing off the occlusal 2mm of 60 extracted human maxillary premolar teeth, the exposed dentin served as the tested surfaces; the teeth were fixed with cold cure acrylic, and were divided into two groups according to the smear layer presence, group A without smear

... Show More
View Publication Preview PDF
Publication Date
Thu May 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of adding single walled carbon nanotube with different concentrations on mechanical properties of heat cure acrylic denture base material
...Show More Authors

Background: The most widely used material for fabrication of denture base is poly methyl methacrylate, despite its popularity, the main problems associated with it as a denture base material are poor strength particularly under fatigue failure inside the patient mouth, impact failure outside the patient mouth, which are the main causes for fracture of denture, several studies was done to increase mechanical properties of denture base. The present study was conducted to evaluate and compare the effect of addition single walled carbon nanotubes in different concentrations to polymethyl methacrylate on some mechanical properties (surface hardness, surface roughness, impact strength and transverse strength). Materials and methods: Forty eight

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2026
Journal Name
Journal Of Engineering
Heat Dissipation Performance of High-Power CPUs using Finned Copper Foam Heat Sinks
...Show More Authors

Thermal management has become a major issue in the latest high performance computing machines because high CPU temperatures result in inefficient performance and decreased hardware life span. In this work, the cooling performance of a finned metal foam heat sink (FMFHS) was examined. The pore density values of tested copper metal foam (CMF) samples with different values of PPI 5, 10 and 20, with a constant porosity of 90%. For reference, these samples were measured by a conventional Aluminum plate-fin heat sink (CHS). The work was performed under experimental conditions in which air directed over the heat sink surface at air velocities (2.5, 3.0 and 3.5 m/s). The environmental temperature was fixed at 27 °C. Findings

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu May 21 2026
Journal Name
Journal Of Physical Education
Some Biomechanical Limitation During Acceleration Phase and Its Relationship With (110) m Hurdles Achievement for Advance Runners
...Show More Authors

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Innovative approaches to the development of the lexical composition of the oil and gas industry : Инновационные подходы развития лексического состава нефтегазовой промышленности
...Show More Authors

 The present study discusses one of the most relevant and required topics in the recent period during globalization, the modern Russian system of terms for the oil and gas industry as a whole acquired a complete form in the second half of the twentieth century. The period of the late XX - early XXI centuries. marked by cardinal transformations in all areas of the political, economic, social and cultural life of Russia. These changes could not but affect industrial production. Transition to a new vector of development of the Russian economy based on the development of commercial trade, on the change and improvement of the development of industrial enterprises in the context of the implementation of national projects and the introduction

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of The College Of Basic Education
Efficient Modifications of the Adomian Decomposition Method for Thirteenth Order Ordinary Differential Equations
...Show More Authors

This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.

View Publication
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The effect of the reciprocal reading strategy in developing innovative reading skills for fifth-year secondary school students / scientific branch
...Show More Authors

       This research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in  Arabic language grammar was prepared,  a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus