In this research, Schiff bases derived from the reaction of anthrone with different heterocyclic amines have been described. The resulted Schiff base compounds were reacted with various nucleophiles in order to obtain new heterocyclic derivatives. Chemical structures of all products were confirmed by IR, 1H-, 13C-NMR spectral data and elemental analysis. All synthesized compounds were in vitro tested against a standard strain of pathogenic microorganism including Gram +ve bacteria (Staphylococcus aureus), Gram –ve bacteria (Escherichia coli), and fungi (Candida albicans).
Numerical investigation has been carried out on heat transfer and friction factor characteristics of copper-water nanofluid flow in a constant heat-fluxed tube with the existence of new configuration of vortex generator using Computational Fluid Dynamics (CFD) simulation. Two types of swirl flow generator: Classical twisted tape (CTT) and Parabolic-cut twisted tape (PCT) with a different twist ratio (= 2.93, 3.91 and 4.89) and different cut depth (= 0.5, 1.0 and 1.5 cm) with 2% and 4% volume concentration
... Show MoreIn this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThis paper aims to study the effect of circular Y-shaped fin arrangement to improve the low thermal response rates of a double-tube heat exchanger containing Paraffin phase change material (PCM). ANSYS software is employed to perform the computational fluid dynamic (CFD) simulations of the heat exchanger, including fluid flow, heat transfer, and the phase change process. The optimum state of the fin configuration is derived through sensitivity analysis by evaluating the geometrical parameters of the Y-shaped fin. For the same height of the fins (10 mm), the solidification time is reduced by almost 22%, and the discharging rate is enhanced by almost 26% using Y-shaped fins compared with the straight fins. The results demonstrate that the sol
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreThis study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment t
... Show MoreThis paper assesses the impact of changes and fluctuations in bank deposits on the money supply in Iraq. Employing the research constructs an Error Correction Model (ECM) using monthly time series data from 2010 to 2015. The analysis begins with the Phillips-Perron unit root test to ascertain the stationarity of the time series and the Engle and Granger cointegration test to examine the existence of a long-term relationship. Nonparametric regression functions are estimated using two methods: Smoothing Spline and M-smoothing. The results indicate that the M-smoothing approach is the most effective, achieving the shortest adjustment period and the highest adjustment ratio for short-term disturbances, thereby facilitating a return
... Show MoreThis paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More