DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
The laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.
The aim of this study is to look at the potential of a local sustainable energy network in a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreDoubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent. The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average weight of their word are constructed. Second, the degree of cl
... Show MoreIn this research was the study of the educational values when Shafei, contained in hair Shafi'i, and that what the role of these values in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation
... Show MoreThe study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous st
... Show MoreThis research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio
... Show MoreThe goal of current research is to identify the difficulties in the application of modern physics in the middle schools of the province of Baghdad schools from the perspective of teachers of physics trends, sample search of (127) teachers, Karkh Third Directorate, and use Researcher questionnaire data collection tool after applying it to teachers who have experience (5) years and more after confirmation of the validity and reliability of the scale (the tool) researcher has used the averages for the purpose of interpreting the results. the results showed that the difficulties have been in the order following: (difficulties related educational environment of modern trends of teaching, curriculum-related dif
... Show More