Preferred Language
Articles
/
ijs-9590
Day to Day variation of Ionosphere Electron and Ion Temperature during Great and Severe Geomagnetic Storms
...Show More Authors

The ionospheric characteristics exhibit significant variations with the solar cycle, geomagnetic conditions, seasons, latitudes and even local time. Representation of this research focused on global distribution of electron (Te) and ion temperatures (Ti) during great and severe geomagnetic storms (GMS), their daily and seasonally variation for years (2001-2013), variations of electron and ion temperature during GMS with plasma velocity and geographic latitudes. Finally comparison between observed and predicted Te and Ti get from IRI model during the two kinds of storm selected. Data from satellite Defense Meteorological Satellite Program (DMSP) 850 km altitude are taken for Te, Ti and plasma velocity for different latitudes during great and severe geomagnetic storms from years 2001 to 2013 according to what is available appeared that there is 22 events for severe and great geomagnetic storms happened during years 2001-2005 only from years selected, from maximum solar cycle 23. From data analysis, in general the temperature of the electron is greater than the temperature of the ion, but there are some disturbances happened during the storm time, in the day there is fluctuation in values of Te and Ti with the value of Ti greater than Te. Through the Dst index, Te and Ti do not depend on the strength of the geomagnetic storm. Plasma velocity variation shows the same profile of Te and Ti variation during the storm time and there is a linear relation between (Te) & (Ti) and plasma velocity. The variation of electron and ion temperature with geographic latitude during severe and great storms appears that as the latitude increases the temperature of ions increases reaches its maximum value approximately 80000K at poles.
From comparing the predicted Te and Ti values calculating from IRI model during the great and severe storms with observed values, it’s found that the predicted values from IRI model much less than the observed values and the variation was nonlinear along 24 hours, from this we can conclude that the model must be corrected for Te and Ti for these two kinds of storms.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Artistic Features Of Re-Writing The Novel "On The Eve, on The Eve" By YevgueniBobov: As an Example: Жанровые Особенности Ремейка (На Материале Романа Е. Попова «Накануне Накануне»)
...Show More Authors

 The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.

The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Laminar Free Convection in Three Dimensional Inclined Porous Annulus with Fins on the Inner Cylinder
...Show More Authors

An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Отражение женского пола в качестве женщины в русских фразеологических единицах на фоне арабского языка Reflection of Feminine Gender as represented by Women in Russian Idioms in Comparison with Arabic
...Show More Authors

Аннотация

Взгляд на пол как на комплексное социальное отношение означает,что роль женщины в истории следует рассматривать не просто как новый для исторической науки предмет исследования, а как обойденный вниманием ученых вопрос об отношениях между людьми или группами людей.

Женщина играет особую и важную  роль в обществе , даже скажут ,что она половина нашего общества ,поэтому она яв

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Investigating the Effects of Canard Dihedral Angle on the Wing Span Loading in a Forward-Swept Wing Aircraft at Transonic Speeds at Steady State Conditions Using Computational Fluid Dynamics
...Show More Authors

Forward-swept wings were researched and introduced to improve maneuverability, control, and fuel efficiency while reducing drag and they are often used alongside canards, to further enhance their characteristics. In this research, the effects of canard dihedral angles on the wing loading of a forward-swept wing in transonic flow conditions were studied, as the wing loading provides a measure of wing’s efficiency (lift/drag). A generic aircraft model from literatures was selected, simulated, and compared to, using CFD software ANSYS/Fluent where the flow equations were solved to calculate the aerodynamic characteristics. The research was carried at two different Mach numbers, 0.6 and 0.9, for five different canard dihedral angles which tra

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 20 2006
Journal Name
00
INVESTIGATING SOME OF THE SYNTACTIC ERRORS MADE BY EFL COLLEGE STUDENTS IN WRITTEN ENGLISH EXPRESSIONS استقصاء بعض الاخطاء النحوية لطلبة الكلية دارسي اللغة الانكليزية لغة اجنبية في التعابير الانشائية
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Issam al-Din al-Asfrani's footnote On the interpretation of the oval Imam Issam al-Din Ibrahim Arbashah al-Asfrani (Th 159 e)   Surah Al-Baqarah (verse 55-911)
...Show More Authors

Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
  Surah Al-Baqarah (verse 55-911)

View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref