The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to
... Show MoreThe blade pitch angle (BPA) controller is key factor to improve the power generation of wind turbine (WT). Due to the aerodynamic structural behavior of the rotor blades, wind turbine system performance is influenced by pitch angle and environmental conditions such as wind speed, which fluctuate throughout the day. Therefore, to overcome the pitch angle control (PAC) problem, high wind speed conditions, and due to type-1 and type-2 fuzzy logic limitations for handling high levels of uncertainty, the newly proposed optimal hybrid type-3 fuzzy logic controller has been applied and compared since type-3 fuzzy controllers utilize three-dimensional membership functions, unlike type-2 and type-1 fuzzy logic controllers. In this paper six differen
... Show MoreThe research aims to apply the activities of the green value chain as one of the modern administrative techniques that economic units resort to develop solutions to the pollution problems that occur due to the activity of economic units and their products that may cause damage to the environment as well as the waste of natural resources and to identify the production of environmentally friendly products and reduce the costs of environmental failure of both types Internal and external that may be borne by economic units such as taxes, fines and compensation due to non- observance of environmental requirements and the preservation of human health and protection of the environment.To achieve the goal of the research, the researchers re
... Show MoreConstruction projects have a special nature and affect them many factors making them exposed to multiple risks as a result of the length of the implementation period and the multiplicity of stages, starting from the decision stage through implementation until the final delivery, which leads to increased uncertainty and the likelihood of risk.
The process of analysis and risk management is one of the effective and productive methods that are used in managing the construction projects for the purpose of increasing the chances of ending the project successfully in terms of cost, time and quality and at the lowest possible problems.
The research aims first to the effective planning for analysis and risk managemen
... Show MoreThe research aimed to study the financial markets liquidity and returns of common stocks , Take the research the theoretical concepts associated with each of the liquidity of financial markets and returns of common stocks , As well as the use of mathematical methods in the practical side to measure market liquidity and Stocks Return, the community of research in listed companies in Iraqi stock exchange that have been trading on its stock and number 85 joint-stock company, The research was based to one premise, there is a statistically significant effect for the liquidity of the Iraqi stock exchange on returns of common stocks to traded companies in which , Using th
... Show MoreA numerical method is developed to obtain two-dimensional velocity and pressure distribution through a cylindrical pipe with cross jet flows. The method is based on solving partial differential equations for the conservation of mass and momentum by finite difference method to convert them into algebraic equations. This well-known problem is used to introduce the basic concepts of CFD including: the finite- difference mesh, the discrete nature of the numerical solution, and the dependence of the result on the mesh refinement. Staggered grid implementation of the numerical model is used. The set of algebraic equations is solved simultaneously by “SIMPLE” algorithm to obtain velocity and pressure distribution within a pipe. In order to
... Show MoreThe research aims to shed light on the role of E-Audit in raising Independence and professional competence of the external auditor, the study has been applied on a sample of the branches of the Rafidain Bank n have been addressed research topic beside the theoretical, as put forward by the literature of accounting, audit and that the contents of the section first, either the practical side was required to test the hypotheses use form questionnaire, which was distributed to a sample of the external auditors and bankers research sample. He has applied for his part in the search for a standard of independence and professionalism of the external auditor and the factors influencing these standards, and the most import
... Show MoreAbstract
The current research sought to demonstrate the effect of material flow cost accounting on reducing products through the application of material flow cost accounting technique, which works on the optimal utilization of materials and energy and the reduction of environmental impacts.The research aims to clarify the knowledge foundations for material flow cost accounting, in addition to studying the material flow cost accounting technique that helps reduce the cost of products and make them environmentally friendly. To achieve this, the research relied on the descriptive approach with regard to the theoretical aspect of the resea
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More