Preferred Language
Articles
/
fBcJIJIBVTCNdQwCFZ4Y
The Dissipation of the Kinetic Energy for 2D Bounded Flow by Using Moment-Based Boundary Conditions with Burnett Order Stress for LBM
...Show More Authors

     In this article, the lattice Boltzmann method with two relaxation time  (TRT)  for the  D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where dissipation of the kinetic energy is found to be proportional to   in the first regime and it is   in the second part of the regime as expected. An excellent agreement with the benchmark data is observed.

Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Phenotypic, genotypic correlation and path coefficient for several traits of maize under watered and water stress
...Show More Authors

Scopus (4)
Scopus
Publication Date
Tue Oct 29 2024
Journal Name
Retos
The effect of special exercises using some auxiliary tools to develop some bio-kinetic abilities and the accuracy of the crushing and snatch forehand strikes among badminton players
...Show More Authors

The best means and ways to develop an athlete's physical and skill capabilities, and among these means is the use of training aids that help develop some bio-kinetic abilities, and prepared exercises have had an important role in improving athletic performance in badminton, where the player must possess physical fitness, explosive power, and strength. Characterized by speed as well as accuracy, awareness, and focus while playing on the court, the badminton player must be physically fit through a continuous movement of small and large muscles to achieve good performance, which requires special physical abilities and skills, and the most important of these bio-kinetic abilities are agility, coordination, and measuring the coordination

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Improvement of energy consumption in MIMO with cognitive radio networks
...Show More Authors

The employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of integration between the earned value management model and the value flow map in rationalizing the costs of construction projects: applied research in Al-Rasheed General Company for Construction Contracting
...Show More Authors

The research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Catalysts for money laundering and control by the banks / analytical study in the province of Arbil measures
...Show More Authors

Receive money laundering phenomenon of interest to researchers and scholars on different intellectual orientation of economic or political or other, as this process is gaining paramount importance in light of business and increase the number of banks in the province of Kurdistan of Iraq and Erbil in particular and in the presence of openness developments chaotic economic and there are no factors encourage money laundering operation because of the presence of the hidden economy and the weakness of the banking and legal measures to combat them, and on this basis there is a need to examine money laundering operation in the province of Arbil, to indicate the presence or absence of a money laundering operation in working in the provin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks
...Show More Authors

<p>The demand for internet applications has increased rapidly.  Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Study the Oxidative Stress, Some Biochemical and Hematological Parameters in patients with agout at AL-Ramadi city
...Show More Authors

This study aims to study the effect of gout disease on complete blood picture and biochemical parameters and some non-enzymatic antioxidants, some tracing elements and lipid peroxidation ,in outpatients with gout disease at Al-Ramadi Teaching-Hospital ,Al-Razi Hospital and the study duration from Octo.2013-to May 2014.(50) blood samples were collected from patients with age groups (30-80 years) from both sexes (28 males,22 females),a (30) blood samples (15 males,15 females) were collected from normal individuals as a control group with age groups (27-75 years). Hematological measurement showed no significant differences in size compressed blood cells, the percentages in ( 45.15 +4.99 and 46.87+6.30) % in patient and control groups respect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Chemical Engineering Journal
Hierarchically porous zeolite X composites for manganese ion-exchange and solidification: Equilibrium isotherms, kinetic and thermodynamic studies
...Show More Authors

View Publication
Scopus (61)
Crossref (57)
Scopus Clarivate Crossref