Preferred Language
Articles
/
joe-2076
Numerical Study Of Heat Transfer In Cooling Passages Of Turbine Blade
...Show More Authors

As the temperature of combustion gases is higher than the melting temperature of the turbine materials, cooling of turbine parts in a gas turbine engine is necessary for safe operation. Cooling methods investigated in this computational study included cooling flow losses. Film-cooling is one typically used cooling method whereby coolant is supplied through holes passage, in present study the holes placed along the camber line of the blade. The subject of this paper is to evaluate the heat transfer that occur on the holes of blade through different
blowing coolant rates. The cases of this study were performed in a low speed wind tunnel with two tip gap at small and large (0.03 and 0.09cm) and multiple coolant flow rates through the film-cooling holes. The
blowing ratios was studied whereby coolant was injected from holes placed along the tip of a large scale blade model with Reynolds number (2.1 x 105 ) of the engine was matched. Results showed that baseline
Nusselt numbers on the holes were reduced along the holes passage, and heat transfer coefficient is high values at iterance region. Overall, the cooling by holes appears to be a feasible method for prolonging blade life.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Arabic Calligraphy quality standards and teaching methods
...Show More Authors

Arabic calligraphy is one of the ancient arts rooted in history, And that he grew up conflicting views and writings addressed as a, communication tool for the linguistic The teaching calligraphy note an art and science because it depends on the fixed assets and precise rules in his art because centered Beauty It targets teach Arabic calligraphy speed as the education and recitation helps to write fast Which have great interest in the field of education and in life both Also accompanied Arabic calligraphy and scientific renaissance significant knowledge in the Ara

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Knowledge, Beliefs and Attitudes towards AIDS among Intermediate and Secondary School Teachers; Baghdad
...Show More Authors

Back ground: AIDS is considered a dreaded disease.
According to recent estimates, 42 million people suffer
from HIV/AIDS (90% of these being in the developing
countries), with 5 million people newly infected with HIV
and 3.1 million deaths in the year 2002 globally. At
present, there is no effective vaccine to prevent the
disease. Hence, Health education (Information, Education
and Communication) activities bringing about behavioral
changes in the community, promoting healthy sexual
behavior and preventing the risky ones is the best possible
solution to the problem of AIDS.
Objectives: To find out the knowledge, beliefs and
attitudes regarding various aspects of HIV/AIDS amongst
intermediate and sec

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 16 2020
Journal Name
مجلة حمورابي
انعكاسات تطور القوة المعلوماتية الامريكية في البيئة الداخلية
...Show More Authors

The global globalization the world is experiencing has enabled international actors—states, international governmental and non-governmental organizations, such as liberation movements, international social movements, and even terrorist organizations—to use cyber power to achieve their goals. Therefore, this study discusses the impact of information power on the domestic environment of the United States.

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Fibrewise totally topological spaces
...Show More Authors

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Oct 02 2022
Journal Name
Al-manhaj
Mathematical Statistics - Second Edition
...Show More Authors

This Book is the second edition that intended to be textbook studied for undergraduate/ postgraduate course in mathematical statistics. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces events and probability review. Chapter Two devotes to random variables in their two types: discrete and continuous with definitions of probability mass function, probability density function and cumulative distribution function as well. Chapter Three discusses mathematical expectation with its special types such as: moments, moment generating function and other related topics. Chapter Four deals with some special discrete distributions: (Discrete Uniform, Bernoulli, Binomial, Poisson, Geometric, Neg

... Show More
Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Guilt and its relationship with the self-awareness Educational research Open Educational College Students
...Show More Authors

Targeted current research study of the relationship between guilt and self-consciousness and consisted of the research community of students from the open educational college, as has been selected students in the Department of Counseling and psychological science department and the researcher used guilt, prepared Scale (Ansari, 2003), and the measure of selfawareness prepared (Shammari 0.2000), and extracted his Alsekoumtria characteristics, Fastkhrjt alternatives after a presentation to a group of experts and specialists in the field of psychological counseling psychology, education, science and psychological validity and reliability Alvakronbach manner and retesting reaching reliability coefficient of guilt ((0.85) and awarenes

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem
...Show More Authors

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

View Publication Preview PDF
Crossref