Preferred Language
Articles
/
KBcxiI4BVTCNdQwCPkxz
Parametric Study of Mixed Convective Radiative Heat Transfer in an Inclined Annulus
...Show More Authors

The steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortran 90) is built to calculate the steady state Nusselt number (Nu) for Aspect Ratio AR (0.55-1) and Geometry Ratio GR (0.1-0.9). The fluid Prandtl number is 0.7, Rayleigh number Ra = 400, Reynolds number Re = 100, Optical Thickness (0 ≤ t ≤ 10), Conduction- Radiation parameter (0 ≤ N ≤ 100) and Inclination angle λ = 45. For the range of parameters considered, results show that radiation enhance heat transfer. It is also indicated in the results that heat transfer from the surface of the circle exceeds that of the rectangular duct. Generally, Nu is increased with increasing GR, t and N but it decreased with AR increase. When the radiation effect added to the heat transfer mechanism, the heat transfer rate increased. This effect increased with increasing in GR and decreasing with AR. The increasing in radiation properties lead to increase the radiation effect. Tecplot 7 program was used to plot the curves which cleared these relations and isotherms and streamlines which illustrate the behavior of air through the channel and its variation with other parameters. A correlation equation is concluded to describe the radiation effect. Comparison of the results with the previous work shows a good agreement.

Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of transverse and tensile bond strength of repaired nylon denture base material by heat, cold and visible light cure acrylic resin
...Show More Authors

Background: Denture fracture is one of the most common problems encountered by the patients and prosthodontists. The objective of present study was to evaluate the transverse strength of nylon denture base resin repaired by using conventional heat polymerized, autopolymerized and visible light cure {VLC} resins, surface treatment that used for repair and adjustment of insufficient nylon denture bases and in case of addition of artificial teeth. As these corrective procedures are common chair side procedures in dental clinic. Materials and methods: One hundred twenty nylon specimens were prepared by using metal patterns with dimension of (65x10x2.5 mm) length, width, and thickness respectively for transverse strength test while for tensile b

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of silanized alumina nano -fillers addition on some physical and mechanical properties of heat cured polymethyl methacrylate denture base material
...Show More Authors

Background: Polymethyl methacrylate (PMMA) is the most commonly used material in denture fabrication. The material is far from ideal in fulfilling the mechanical requirements. Midline fracture; poor thermal conductivity and water sorption, are common problem in this material. The purpose of this study was to evaluate the effect of addition of surface treated Aluminum oxide nano fillers on some properties of heat cured (PMMA). Materials and methods: In addition to controlled group of heat cured PMMA the silanized (Al2O3) nanoparticles was added to PMMA powder by weight in three different percentages 1wt%, 2wt% and 3wt%, mixed by probe ultra-sonication machine. 200 specimens were constructed and divided into 5 groups according to the test (e

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
5th Iet International Conference On Renewable Power Generation (rpg), 2016, London, Uk
Electrical Machine Design for use in an External Combustion Free Piston Engine
...Show More Authors

Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Directorship Vision in Epic Drama Shows " AWNI KROMI AS AN EXAMPLE"
...Show More Authors

View Publication
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Quest for an Ideal Beauty in Toni Morrison's The Bluest Eye
...Show More Authors


In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.


View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
An Investigation to the Abrasive Wear in Pipes Used for Oil Industry
...Show More Authors

The work reported in this study focusing on the abrasive wear behavior for three types of pipes used in oil industries (Carbone steel, Alloy steel and Stainless steel) using a wear apparatus for dry and wet tests, manufactured according to ASTM G65. Silica sand with
hardness (1000-1100) HV was used as abrasive material. The abrasive wear of these pipes has been measured experimentally by measuring the wear rate for each case under different sliding speeds, applied loads, and sand conditions (dry or wet). All tests have been conducted using sand of particle size (200-425) µm, ambient temperature of 34.5 °C and humidity 22% (Lab conditions).
The results show that the material loss due to abrasive wear increased monotonically with

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses

... Show More
Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref