Steady conjugate natural convection heat transfers in a two-dimensional enclosure filled with fluid saturated porous medium is studied numerically. The two vertical boundaries of the enclosure are kept isothermally at same temperature, the horizontal upper wall is adiabatic, and the horizontal lower wall is partially heated. The Darcy extended Brinkman Forcheimer model is used as the momentum equation and Ansys Fluent software is utilized to solve the governing equations. Rayleigh number (1.38 ≤ Ra ≤ 2.32), Darcy number (3.9 * 10-8), the ratio of conjugate wall thickness to its height (0.025 ≤ W ≤ 0.1), heater length to the bottom wall ratio (1/4 ≤ ≤ 3/4) and inclination angle (0°, 30° and 60°) are the main considered parameters. The presented results show the effect of these parameters on the heat transfer and fluid flow characteristics. These results include streamlines, isotherm patterns, and local and average Nusselt number for different values of the governing parameters. It is found that either increasing the Rayleigh number and the ratio of conjugate wall thickness to its height (d/H) or decreasing the ratio of heat source width to bottom wall (l/L), the average Nusselt number is increased. Also, it was observed that the average Nusselt number does not change substantially with inclination angle.
The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.
Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreThe idea of a common defect of the guarantee has gone through many developments in terms of defining the concept of this defect, starting with civil legislation and passing through the United Nations convention on contracts for the international sale of goods of 1980 (the Vienna agreement) and ending with legislation on consumer protection, and the French judiciary had an important role in developing this idea, so this came. Research to study these developments while clarifying the Iraq law's position on them and explaining the extent to which Iraqi legislation has reached in taking these developments, as the concept of defect no longer includes the shortage in the price of the sale or what is missed by a valid purpose, but rather expand
... Show Moreالنظام السياسي اليمني : دراسة في المتغيرات الداخلية
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image co
... Show MoreThe Iraqi people were subjected to the most brutal crime in the history of humanity when ISIS violated the rights system and targeted women, children, civilians, minorities, religion, belief and the right to education and committed many crimes of genocide and crimes against humanity and the abandonment of millions of citizens and the recruitment of thousands of children, which constituted a flagrant violation of human rights and international law It emphasizes the gravity of the threat to international peace and security by the organization and its associated individuals, groups, institutions and entities, including foreign terrorist fighters.
That the legal characterization
... Show More