Preferred Language
Articles
/
joe-814
Two Stage Evaporative Cooling of Residential Building Using Geothermal Energy
...Show More Authors

The weather of Iraq has longer summer season compared with other countries. The ambient temperature during this season reaches over 50 OC which makes the evaporative cooling system suitable for this climate. In present work, the two-stage evaporative cooling system is studied. The first stage is indirect evaporative cooling (IEC) represented by two heat exchangers with the groundwater flow rate (5 L/min). The second stage is direct evaporative cooling (DEC) which represents three pads with groundwater flow rates of (4.5 L/min). The experimental work was conducted in July, August, September, and October in Baghdad. Results showed that overall evaporative efficiency of the system (two coils with three pads each pad of 3cm) reach to 167 % with the temperature difference between ambient and supply is 26.2oC. While it reached 122.7% (one coil with three pads ) with the temperature difference between ambient and supply is 16OC and reduced to 84.88% and 84.36% for IEC and DEC respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 01 2026
Journal Name
Energy
Smart buildings envelope utilise triple PCM for offset and reduce peak load using deep clustering of multi-agent control
...Show More Authors

Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Using tow Methods of Pronounced and written Feed Back in Academic acquisition of students of technical medicine institute in philosophy curriculum
...Show More Authors

The world faces, in the last years of the last century and the beginning
of the current century i.e. the 21st century, a great expansion and a large
openness on new worlds in studies differ in their development, detection of
thinking methods and practice of mental processes.
The recent studies have proved an increase in the scientific
achievement among students through the presence of new techniques one of
which is Landa Organizing and Exploring Model concerning Physiology that
deals with various body organs.
This research aims at identifying the effectiveness of Landa Model on
the achievement of the Technical Medicine Institute students in Physiology so
as to be sure of the following nil hypothesis: there i

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2026
Journal Name
Journal Of Physical Education
The effect of special exercises using a designer device and added relative weights to develop some of the physical abilities of volleyball players
...Show More Authors

View Publication
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Using the Information Technology on The Audit Profession: A Study of the Sample of Auditor Viewpoints in Selected Arab Countries
...Show More Authors

This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in  developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in  Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Modern Sport
The Effect of Using Competitive Challenge Games in Improving the Performance of Some Complex Offensive Skills at the Ages of (10–12) Years
...Show More Authors

One of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Digital Signal Processing
Reverberant signal separation using optimized complex sparse nonnegative tensor deconvolution on spectral covariance matrix
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref