Preferred Language
Articles
/
IRegRo4BVTCNdQwC-0Ai
CONJUGATE NATURAL CONVECTION IN A POROUS ENCLOSURE SANDWICHED BY FINITE WALLS AND SUBJECTED TO CONVECTION COOLING CONDITION
...Show More Authors

Steady conjugate natural convection heat transfers in a two-dimensional enclosure filled with fluid saturated porous medium is studied numerically. The two vertical boundaries of the enclosure are kept isothermally at same temperature, the horizontal upper wall is adiabatic, and the horizontal lower wall is partially heated. The Darcy extended Brinkman Forcheimer model is used as the momentum equation and Ansys Fluent software is utilized to solve the governing equations. Rayleigh number (1.38 ≤ Ra ≤ 2.32), Darcy number (3.9 * 10-8), the ratio of conjugate wall thickness to its height (0.025 ≤ W ≤ 0.1), heater length to the bottom wall ratio (1/4 ≤  ≤ 3/4) and inclination angle (0°, 30° and 60°) are the main considered parameters. The presented results show the effect of these parameters on the heat transfer and fluid flow characteristics. These results include streamlines, isotherm patterns, and local and average Nusselt number for different values of the governing parameters. It is found that either increasing the Rayleigh number and the ratio of conjugate wall thickness to its height (d/H) or decreasing the ratio of heat source width to bottom wall (l/L), the average Nusselt number is increased. Also, it was observed that the average Nusselt number does not change substantially with inclination angle.

Scopus Crossref
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
The Fourth International Conference Of Linguistic Studies
A pragmatic study of refusals among Iraqi EFL learners
...Show More Authors

The speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p

... Show More
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Mathematical Model for One Year Planning of a Manufactory
...Show More Authors

This paper is an attempt to help the manager of a manufactory to

plan for the next year by a scientific approach, to maximize the profit and Ø¢ provide optimal Ø¢ monthly quantities of Ø¢ production, Ø¢ inventory,

work-force, prices and sales. The computer programming helps us to execute that huge number of calculations.

View Publication Preview PDF
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of King Saud University - Science
A semi-analytical iterative technique for solving chemistry problems
...Show More Authors

View Publication
Crossref (16)
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Force degradation of orthodontic elastomeric chains: A literature review
...Show More Authors

Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. T

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Salivary Immune Parameters as A Predictor of Oral Diseases
...Show More Authors

Diabetes mellitus (DM) is a metabolic and hormonal disorder in which the body does not produce sufficient or respond ordinarily to insulin, leading to an increase in blood sugar (glucose) levels. This disordered has many side effects on body health, one of them being oral health. This study aimed to find these effects on several oral immune parameters included (IL6, CRP, and alpha-amylase) and the possible use of these parameters in the prediction of oral health and further risk sequel. A total of 91 specimens including 51 DM patients and 40 apparently healthy individuals were enrolled in this study which was carried out from November/2021 to February/2022. The results revealed that, abnormal increase of both IL6 and CRP in the saliva of

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref