Preferred Language
Articles
/
joe-295
Modified Grid Clustering Technique to Predict Heat Transfer Coefficient in a Duct of Arbitrary Cross Section Area
...Show More Authors

A simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.

The method is utilized to predict Nusselt number distribution in a hybrid cross section area duct, non-circular non-rectangular, for laminar incompressible flow under Uniform Wall Temperature condition. The results have been compared with the published data and the agreement has been found very well.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 24 2014
Journal Name
Journal Of Religion And Health
Cross-Cultural Validation and Psychometric Properties of the Arabic Brief Religious Coping Scale (A-BRCS)
...Show More Authors

View Publication
Scopus (26)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying the Factors Affecting the Drag Coefficient in Non- Newtonian Fluids
...Show More Authors

The aim of this research is to study the factors affecting drag coefficient (C d ) in
non-Newtonian fluids which are the rheological properties ,concentrations of non-
Newtonian fluids, particle shape, size and the density difference between particle and
fluid .Also this study shows drag coefficient (C d ) and particle Reynolds' number (Re
P ) relationship and the effect of rheological properties on this relationship.
An experimental apparatus was designed and built, which consists of Perspex pipe
of length of 160 cm. and inside diameter of 7.8 cm. to calculate the settling velocity,
also electronic circuit was designed to calculate the falling time of particles through
fluid.
Two types of solid particles were

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 03 2013
Journal Name
Iraqi Journal Of Medical Sciences
Ligasure versus clamp and tie technique to achieve henostasis in thyroidectomy for benign diseases
...Show More Authors

Publication Date
Sat Jan 12 2019
Journal Name
Journal Of The College Of Education For Women
Strategic Analysis for the Grain Grinders' establishments in Baghdad governorate and problems suffered by the industry, along with the possibility to predict its products
...Show More Authors

Geography of industry has been considered a branch of important economic geographical branches. This importance has been regarded as a reflection on the industrial sector contribution in economies of any state since they contribute into the total national product ; it also assimilates a huge number of labor hands . The industry of grains grinding has been considered as one of the main food industries having a main role in satisfying the need of the population from the foods. The industry is continued to use the food as daily meal . Here, it should predict the population in Baghdad and for every district until the end of 2025 and knowing either these grains grinders are able to meet and satisfy the needs of populations of flours, making s

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
The Effect of Vehicle Body Shapes on the Near Wake Region and Drag Coefficient: A Numerical Study
...Show More Authors

The purpose of this paper is to gain a good understanding about wake region behind the car body due to the aerodynamic effect when the air flows over the road vehicle during its movement. The main goal of this study is to discuss the effect of the geometry on the wake region and the aerodynamic drag coefficient. Results will be achieved by using two different shapes, which are the fastback and the notchback. The study will be implemented by the Computational Fluid Dynamic (CFD) by using STAR-CCM+® software for the simulation. This study investigates the steady turbulent flow using k-epsilon turbulence model. The results obtained from the simulation show that the region of the air separation behind the vehicle

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors