Preferred Language
Articles
/
alkej-631
Free Convective Heat Transfer with Different Sections Lengths Placed at the Exit of a Vertical Circular Tube subjected to a Constant Heat Flux
...Show More Authors

A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of 600 mm (L/D=20), 900 mm (L/D=30), 1200 mm (L/D=40), 1500 mm (L/D=50), and 1800 mm (L/D=60). It was found that the surface temperature along the tube axial distance would be higher for restriction with length of 1800 mm (L/D=60) and it would be smaller for the restriction with length of 1200 mm (L/D=40). The results show that the local Nux and average Nusselt number were higher values for the restriction with length of 1200 mm (L/D=40) and smaller values for the restriction with length of 1800 mm (L/D=60). The results were correlated with empirical equations and presented as Logagainst Log for each case investigated and a general empirical equation was proposed for all cases.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Economic globalization adapts to a new stage of development
...Show More Authors

the pursue of social  systems history present to us solid evidence that the collapse of  that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate  auto adaptation mechanism and use it excellently in the right time.

The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Business incubators the entrance of organizations to shift towards pioneering performance a study by a number of employees of the technical education organizations in mosul
...Show More Authors

     The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading  role of organizations  in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul.  .

     After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat May 14 2022
Journal Name
Oral And Maxillofacial Surgery
Evaluation of crestal sinus floor elevations using versah burs with simultaneous implant placement, at residual bone height ≥ 2.0 _ < 6.0 mm. A prospective clinical study
...Show More Authors

View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (14)
Scopus
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a

... Show More
View Publication
Scopus (14)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Attitude The King Ghazi a Problem the Border with Kuwait 1933-1939
...Show More Authors

King Ghazi (1933-1939) was of the Arabic characters that characterized national and
patriotic spirit and that faced the British policy in all its aspects.
King Ghazi distinguished as of Arab nationalist tendencies and called for the
liberalization of Arab lands which were under the rule of the Ottoman Empire. He called for
reunification under the one Arab country, Hence came the King invitations to liberate Kuwait
from the British protectorate and consolidated with Iraq.
King Ghazi established a private radio station in the royal palace (AL zzaahoor) palace
and provided special programs to return of Kuwait to Iraq, this radio station was The
prominent role in the revitalization of the Kuwaiti National Movement, an

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Effect of Steel Fibers on the Properties of Refractory Free Cement Concrete
...Show More Authors

Free cement refractory concrete is a type of refractory concrete with replacing alumina cement by bonding materials such as white kaolin, red kaolin and fumed silica. The free cement refractory concrete used in many applications like Petrochemicals, iron furnaces and cement production industries. The research clarifies the effect of steel fibers with two types crimped steel fibers and hooked steel
fibers with percentages 0.5%, 1% and 1.5% by volume from weight of bauxite aggregates. The additions of steel fibers with two types gave good properties in high temperatures where the specimens keep the dimension without failure and the properties made the best. the percentage of increasing for thermal conductivity was 44% for 1.5% crimped

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref