Preferred Language
Articles
/
ijcpe-333
Prediction and Correlations of Residual Entropy of Superheated Vapor for Pure Compounds
...Show More Authors

Prediction of accurate values of residual entropy (SR) is necessary step for the
calculation of the entropy. In this paper, different equations of state were tested for the
available 2791 experimental data points of 20 pure superheated vapor compounds (14
pure nonpolar compounds + 6 pure polar compounds). The Average Absolute
Deviation (AAD) for SR of 2791 experimental data points of the all 20 pure
compounds (nonpolar and polar) when using equations of Lee-Kesler, Peng-
Robinson, Virial truncated to second and to third terms, and Soave-Redlich-Kwong
were 4.0591, 4.5849, 4.9686, 5.0350, and 4.3084 J/mol.K respectively. It was found
from these results that the Lee-Kesler equation was the best (more accurate) one
compared with the others, but this equation is sometimes not very preferable. It was
noted that SRK equation was the closest one in its accuracy to that of the Lee-Kesler
equation in calculating the residual entropy SR of superheated vapor, but it was
developed primarily for calculating vapor-liquid equilibrium and to overcome this
problem, efforts were directed toward the possibility of modifying SRK equation to
increase its accuracy in predicting the residual entropy as much as possible. The
modification was made by redefining the parameter α in SRK equation to be a
function of reduced pressure, acentric factor, and polarity factor for polar compounds
in addition to be originally function of reduced temperature and n parameter –which is
also function of acentric factor– by using statistical methods. This correlation is as
follows:

α =[1+n(γ)]2  , γ=-0.920338Pr-0.34091 +0.064049Tr4 ω +0.370002ω-Pr0.996932 Tr-4x
This new modified correlation decreases the deviations in the results obtained by
using SRK equation in calculating SR when comparing with the experimental data.
The AAD for 2791 experimental data points of 20 pure compounds is 4.3084 J/mol.K
while it becomes 2.4621 J/mol.K after modification. Thus SRK equation after this
modification gives more accurate results for residual entropy of superheated vapor of
pure 20 compounds than the rest of the equations mentioned above.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 10 2018
Journal Name
Opción
The Effect of Cognitive Modeling Strategy in chemistry achievement for students
...Show More Authors

The aim of the current research is to verify the effect of the cognitive modeling strategy on the achievement of the chemistry course for the students of the first intermediate grade. To achieve the objective of the research, the null hypothesis was formulated via cognitive modeling strategy. The results showed that the experimental group's students performed better than the students in the control group. In the light of the results, the researchers concluded: The impact of the cognitive modeling strategy in the achievement of students of first intermediate grade in chemistry.

Scopus (2)
Scopus
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Features of (Possible for Itself) in the (Alashaira) opinion – Spoken Study
...Show More Authors

My study here is about the (possible for itself) features especially in the (Alashaira) opinion, also I touch to the other logicians opinions, I clarified these features concisely in the preface to be clear in front of the reader, I made it in two studies and five subjects.I talked about the meaning of the existence in the ((possible for itself) theme, and I clarified its types in the logicians and the philosophers' opinions, through which the existence and the nonexistence are equal in it, as it cannot be existed nor be nonsexist unless with a separated reason, and there is no necessity to oblige its existence, or its nonexistence is impossible.Then I talked about the outweighing of the (possible for itself) as one side  of the exi

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
A study of some atomic properties for He-like selected ions
...Show More Authors

The atomic properties have been studied for He-like ions (He atom, Li+, Be2+ and B3+ions). These properties included, the atomic form factor f(S), electron density at the nucleus , nuclear magnetic shielding constant and diamagnetic susceptibility ,which are very important in the study of physical properties of the atoms and ions. For these purpose two types of the wave functions applied are used, the Hartree-Fock (HF) waves function (uncorrelated) and the Configuration interaction (CI) wave function (correlated). All the results and the behaviors obtained in this work have been discussed, interpreted and compared with those previously obtained.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Identifying the selection criteria of design consultant for Iraqi construction projects
...Show More Authors
Abstract<p>The quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Approvals of the Imam nuclear for Iraqis Through the student platform
...Show More Authors

The research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher

View Publication Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
Nutritional Status of Children below Five Years in Iraq for 2018
...Show More Authors

In this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr

... Show More
Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF