Preferred Language
Articles
/
joe-1233
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presence of vibration, magnetic fields, and heat generation. They used different thermal and hydrodynamic boundary conditions, different geometries of cavity, and different saturated-fluids. Results manifested that the fluid and thermal characteristics enhance greatly as porosity increases at a high value of Darcy number. Also, vibrational effects are a dominant factor in the heat transfer process only at high Darcy and Reynolds numbers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Impact of oral hygiene instructions on cytokines in smokers and vapers with gingivitis
...Show More Authors

Background: Cigarette smoking (CS) is a periodontal disease risk factor, affecting clinical parameters such as bleeding on probing (BOP), plaque index (PI), gingival index (GI) and proinflammatory cytokines level. This study examines the impact electronic cigarette use on proinflammatory cytokines and periodontal parameters. Methods: In this non-randomized study, ninety participants diagnosed with gingivitis were assigned into three groups. examined the effect of oral hygiene instructions on periodontal parameters and inflammatory biomarkers. Thirty CS (n=30) vaping electronic-cigarettes (e-cig) (n=29), and non-smoker (NS) (n=31) was included. Clinical parameters including PI, BOP, and GI were recorded at baseline and after 3 weeks

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Gas Sensor Application of New Composite Based on MWCNTs:CoPc:Metal Oxide
...Show More Authors

The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with  CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Dec 29 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF NITROGEN, PHOSPHOROUS AND POTASSIUM LEVELS ON THE PRODUCTIVITY OF INDUSTRIAL POTATOES
...Show More Authors

The experiment was conducted using Potato( Solanum tuberosum L.) at the eastern Radwaniyah at private field during fall season 2020/2021 and spring 2021 to study the effect of nitrogen levels to 350, 275, 200 kg N h-1 ( N1, N2, N3) and phosphorous to 100, 180, 360 kg P2O5 h-1 ( P1, P2, P3) and potassium to 100, 200, 300 kg K2O h-1 ( K1, K2, K3) to vegetative growth and yield of industrial potato, The seeds of the hybrid potato Sinora, Class A, were planted in the fall season on 15/9/2020 and Elite in the spring season on 31/1/2021. The experimental fertilizers were added in four batches and in proportions according to the stages of plant age, Factorial experiment with RCBD using three replications. The results showed that changing t

... Show More
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
The Effect of Combination Ovariectomy and D-galactose Administration on Alzheimer's Animal Model
...Show More Authors

Background and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geminivirus : Detection, Diagnosis And Management
Geminiviruses occurrence in the middle east and their impact on agriculture in Iraq
...Show More Authors

View Publication
Scopus (19)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Synthesis and characterization study of n-Bi2O3/p-Si heterojunction dependence on thickness
...Show More Authors

View Publication
Scopus (15)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Drug Development & Registration
Cytotoxic Effect of 6-Ethyl-Chenodeoxycholic Acid and Cabazitaxel on PC-3 Cells
...Show More Authors

Introduction. Chemotherapy with Cabazitaxel (CBZ) is a typical first-line treatment option for naïive castration-resistant prostate cancer resistant to docetaxel. On the other hand, Cabazitaxel's therapeutic success is constrained by chemoresistance and side effects.

Aim. To assess whether 6 alpha-ethylchenodeoxycholic acid (6-ECDCA), a selective agonist for bile acid receptors will enhance the efficacy of CBZ in androgen-independent prostate cancer cells.

Materials and methods. The 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) viability assay was used to assess the cytotoxicity of 6-ECDCA and CBZ medicines or t

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref