Preferred Language
Articles
/
PxdWfpMBVTCNdQwCxtSn
Identification of Time-Wise Thermal Diffusivity, Advection Velocity on the Free-Boundary Inverse Coefficient Problem
...Show More Authors

This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-linear optimization problem and use the lsqnonlin non-linear least-square solver from the MATLAB optimization toolbox. Through examples and discussions, we determine the optimal values of the regulation parameters to ensure accurate, convergent, and stable reconstructions. The direct problem is well-posed, and the Crank–Nicolson method provides accurate solutions with relative errors below 0.006% when the discretization elements are M=N=80. The accuracy of the forward solutions helps to obtain sensible solutions for the inverse problem. Although the inverse problem is ill-posed, we determine the optimal regularization parameter values to obtain satisfactory solutions. We also investigate the existence of inverse solutions to the considered problems and verify their uniqueness based on established definitions and theorems.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Engineering
Thermal Performance of Plastic Receiver in Solar Collector
...Show More Authors

A plastic tubes used as absorber of active flat plate solar collector (FPSC) for heating water were studied numerically and experimentally. The set-up is located in Babylon (republic of Iraq) 43.80 East longitude and 32.30 North latitude with titled of 450 toward the south direction.  The study involved three dimensions mathematical model for flat coil plastic absorber which solved by FLUENT-ANSYS-R.18 program. Experiments were conducted at outdoor conditions for clear days on January and February 2018 with various water volume flow rates namely (500, 750, 1000, 1250, and 1500 Liter per hour LPH) on each month for Reynolds number range of (1 x 104 to 5 x 104) th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
Inversion to density and velocity model by integrated with wells data at regional area (central and southwestern Iraq)
...Show More Authors

A new derivative applied to the old gravity Bouguer map (served in 1940s and 1950s), taking regional study area covered the mid and south of Iraq. The gravity anomaly reflects a density contrast variation; therefore it is possible to use gravity inversion to the density and velocity model through layers (615m, 1100m, 1910m, 2750m and 5290m), the depth layers according to the power spectrum analysis of gravity Bouguer. The inversion is according to the integration of gravity anomalies of the each depth layer with the same depth of wells data, considered to the estimations and analysis of density and velocity scatters of the oil wells distribution with depth at the regional area. Taking the relation

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Experimental Study of Electrical and Thermal Efficiencies of a Photovoltaic Thermal (PVT) Hybrid Solar Water Collector with and Without Glass Cover
...Show More Authors

Investigating the thermal and electrical gains and efficiencies influence the designed photovoltaic thermal hybrid collector (PVT) under different weather conditions. The designed system was manufactured by attaching a fabricated cooling system made of serpentine tubes to a single PV panel and connecting it to an automatic controlling system for measuring, monitoring, and simultaneously collecting the required data. A removable glass cover had been used to study the effects of glazed and unglazed PVT panel situations. The research was conducted in February (winter) and July (summer), and March for daily solar radiation effects on efficiencies. The results indicated that electrical and thermal gains increased by the incre

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of a proposed program to solve the problem of mixing Arabic letters similar to the voice of students in the second grade primary
...Show More Authors

The purpose of this research is to demonstrate the effectiveness of a program to address the problem of mixing similar letters in the Arabic language for students in the second grade of primary and to achieve the goal of the research. The researcher followed the experimental method to suit the nature of this research and found that there are statistically significant differences between the tribal and remote tests, The effectiveness of the proposed educational program. At the end of the research, the researcher recommends several recommendations, the most important of which are: 1 - Training students to correct pronunciation of the outlets, especially in the first three stages of primary education (primary) and the use of direct training

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
Optimizing the MPLS support for real time IPv6-Flows using MPLS-PHS approach
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Jun 08 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
THE ROLE OF TAX IDENTIFICATION NUMBER IN TAX FRAUD PREVENTION : APPLIED RESEARCH AT THE GENERAL TAX AUTHORITY IN IRAQ
...Show More Authors

This thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement  the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref