Preferred Language
Articles
/
joe-44
Experimental Study on Heat Transfer and Friction Factor Characteristics of Single Layer Graphene Based DI-water Nanofluid in a Circular Tube under Laminar Flow and Different Heat Fluxes as Boundary Conditions
...Show More Authors

An experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the  enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate  increased, and the maximum Nusselt number  ratio (Nu nanofluid/ Nu base fluid)   and thermal performance factor was (1.45) and (1.24) respectively, by using (1wt%) concentration and q=6104W/m2  heat flux. Finally, an analysis of the thermal performance factor shows that the GNPs nanofluids could work as a good alternative conventional working fluid in thermal heat transfer applications. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Energy Consumption Analyzing in Single hop Transmission and Multi-hop Transmission for using Wireless Sensor Networks
...Show More Authors

Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
The Surgical outcomes of fundus-first technique in lowering the rate of bile duct injuries and bleeding during open cholecystectomy that facing intraoperative difficulties: A single-center prospective study: The surgical outcomes of open fundus-first cholecystectomy technique.
...Show More Authors

Background: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.

Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection and isolation of flavonoid and aromatic acid from Cynara scolymus different parts cultivated in iraq
...Show More Authors

The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).

Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 22 2021
Journal Name
International Journal Of Corrosion And Scale Inhibition
Role of vitamin C in the protection of the gum and implants in the human body: theoretical and experimental studies
...Show More Authors

The article describes a study on the role of vitamin C as a protective agent for the teeth, gum, and implants using quantum chemical calculations and polarization tests. The Density Functional Theory (DFT) at 6-311G (d, p) basis set is used to estimate the ability of vitamin C to inhibit the corrosion of the abovementioned parts. The experimental study was performed in a at human body media simulator (Hank’s balanced salt solution) at a temperature of 37°C. The compound was optimized for its ground state, physical properties, and corrosion parameters. Further, HOMO, LUMO, energy gap, dipole moment, and other parameters were used to predict the inhibitor’s efficiency. Gaussian 09, UCA-FUKUI, MGL tools, DSV, and LigPlus software was used

... Show More
View Publication
Scopus (36)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Journal Of Engineering
Revolutionizing Depth Sensing: A Review Study of Apple LiDAR Sensor for as-built Scanning Applications
...Show More Authors

Incorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conf. Series: Materials Science And Engineering
Numerical Study of Specially Shaped Slender RC Columns under Compressive Load
...Show More Authors
Abstract<p>In most Reinforced Concrete (RC) buildings, the cross-section size of rectangular columns that conventionally used in these structures is larger than the thickness of their partitions. Consequently, a part of the column is protruded out of the wall which has some architectural disadvantages. Reducing the column size by using high strength concrete will result in slender column, thus the stability problem may be occurred. The stability problem is difficult to be overcome with rectangular columns. This paper study the effectiveness of using new types of columns called Specially Shaped Reinforced Concrete (SSRC) columns. Besides, the use of SSRC columns provides many structural advantage</p> ... Show More
Scopus (1)
Crossref (1)
Scopus Crossref