Preferred Language
Articles
/
JoazpIYBIXToZYAL3pxW
Promising Gains of 5G Networks with Enhancing Energy Efficiency Using Improved Linear Precoding Schemes
...Show More Authors

Scopus Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
The Dissipation of the Kinetic Energy for 2D Bounded Flow by Using Moment-Based Boundary Conditions with Burnett Order Stress for LBM
...Show More Authors

     In this article, the lattice Boltzmann method with two relaxation time  (TRT)  for the  D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where d

... Show More
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Improved photocatalytic degradation of methyl violet dye and pathogenic bacteria using g-C3N4 supported phosphotungstic acid heterojunction
...Show More Authors

Scopus (43)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Data Aggregation in Wireless Sensor Networks Using Modified Voronoi Fuzzy Clustering Algorithm
...Show More Authors

Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Energy and Exergy Analyses of Heat Pump Cycle with Refrigerant Injection Technology
...Show More Authors

The effect of refrigerant injection techniques on the performance of heat pump system based on exergy analysis was studied theoretically. Three refrigerant injection techniques were used; the first was achieved by injected vapour in volume ratios from 1 to 7% in the accumulator. The second was injection liquid refrigerant in the discharge line with the aid of Liquid Pressure Amplification (LPA) pump, with volume ratios from 1 to 10%. The third was a hybrid injection with volume ratios of injected vapour and liquid varied from 1 to 3% and 1 to 10%; respectively. The following improvements in cycle performance were observed. For vapour injection technique, the best ratio of injection was 5%, the exergy destruction reduced

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Oscillations of First Order Linear Delay Differential Equations with positive and negative coefficients
...Show More Authors

Oscillation criteria are obtained for all solutions of the first-order linear delay differential equations with positive and negative coefficients where we established some sufficient conditions so that every solution of (1.1) oscillate. This paper generalized the results in [11]. Some examples are considered to illustrate our main results.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Energy Dissipation on the Ogee Spillways by Using Direction Diverting Blocks
...Show More Authors

The purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 09 2017
Journal Name
International Journal Of Science And Research (ijsr)
Fingerprints Recognition Using the Local Energy Distribution over Haar Wavelet Subbands
...Show More Authors

Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds

... Show More
View Publication
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Solve travelling sales man problem by using fuzzy multi-objective linear programming
...Show More Authors

   The main focus of this research is to examine the Travelling Salesman Problem (TSP) and the methods used to solve this problem where this problem is considered as one of the combinatorial optimization problems which met wide publicity and attention from the researches for to it's simple formulation and important applications and engagement to the rest of combinatorial problems , which is based on finding the optimal path through known number of cities where the salesman visits each city only once before returning to the city of departure n this research , the benefits  of( FMOLP)   algorithm is employed as one of the best methods to solve the (TSP) problem and the application of the algorithm in conjun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Linear Boundary Value Problem Using Shooting Continuous Explicit Runge-Kutta Method
...Show More Authors

  In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem  which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.

View Publication Preview PDF