Preferred Language
Articles
/
OhcAXJIBVTCNdQwCOa3c
Minimizing the Principle Stresses of Powerhoused Rock-Fill Dams Using Control Turbine Running Units: Application of Finite Element Method
...Show More Authors

This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse represented by four vertical Francis turbines, foundation, and the upstream reservoir. Changing the upstream water table minimum and maximum water levels, standers earth gravity, fluid-solid interface, hydrostatic pressure, and the soil properties are considered. The dam model runs to cover all possibilities for turbines operating in accordance with the reservoir discharge ranges. In order to minimize stresses in the dam body and increase dam safety, this study optimizes the turbine operating system by integrating turbine and dam models.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of supervisory control requirements on the financial performance of Islamic banks in Iraq: Case Study: Islamic Cooperation Bank for Investment and Development for the years (2015-2018)
...Show More Authors

Given the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the use of automated accounting systems technology in enhancing the efficiency and effectiveness of the internal control system.: دراسة تحليلية لعينة من الموظفين العاملين في اقسام المحاسبة والتدقيق في الجامعات البحرينية
...Show More Authors

The research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the                                       electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Auto-Regressive Distributed Lag Method in Investigating The Impact of Interest Rate on Foreign Direct Investment in Yemen for the Period 1990-2018
...Show More Authors

 Foreign direct investment has seen increasing interest worldwide, especially in developing economies. However, statistics have shown that Yemen received fluctuating FDI inflows during the period under study. Against this background, this research seeks to determine the relationship and impact of interest rates on FDI flows. The study also found other determinants that greatly affected FDI inflows in Yemen for the period 1990-2018. Study data collected from the World Bank and International Monetary Fund databases. It also ensured that the time series were made balanced and interconnected, and then the Auto Regressive Distributed Lag method used in the analysis. The results showed that the interest rates and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Commercial banks in Iraq had applied in practice different forms of its activities upon surplus funds that deposited from individual, firms and many governments units
...Show More Authors

These deposits take many forms like current acc, deposits in order to growth and serve national economy Various in varicose perspectives .

The problem of this paper its concern with un applied the mathematical models that used in profitability analysis of current acc , and deposits in view of risk, profit efficiency and financial leverage for this reason the paper discussion use the cumulate mathematical model to solve these problem, that content three variables that be used to measuring profitability by consequent replacement method by stable base and by moving base for 2007 – 2009 applied the data collect from Iraq middle east bank.           &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More