Mixed convection heat transfer to air inside an enclosure is investigated experimentally. The bottom wall of the enclosure is maintained at higher temperature than that of the top wall which keeps in oscillation motion, whereas the left and right walls are well insulated. The differential temperature of the bottom and top walls changed several times in order to accurately characterize the temperature distribution over a considerable range of Richardson number. Adjustable aspect ratio box was built as a test rig to determine the effects of Richardson number and aspect ratio on the flow behavior of the air inside the enclosure. The flow fields and the average Nusselt number profiles were presented in this wo
... Show MoreThe research aims to identify the effectiveness of violence by parents in the consolidation of positive values among students. Additionally, the research aims to identify the differences in violence levels among students regarding their gender (males & females). The study was limited to the intermediate school students in Baghdad city / Karkh2 for the academic year 2017-2018. The results showed that males are more violent than females do and that discrimination led to experience violence more than other methods. The researcher recommends the need to create a positive atmosphere within the school context. For future studies, the researcher suggests conducting a study to identify the violence and its relation to some personal character
... Show MoreThe load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d
Sand production in unconsolidated reservoirs has become a cause of concern for production engineers. Issues with sand production include increased wellbore instability and surface subsidence, plugging of production liners, and potential damage to surface facilities. A field case in southeast Iraq was conducted to predict the critical drawdown pressures (CDDP) at which the well can produce without sanding. A stress and sanding onset models were developed for Zubair reservoir. The results show that sanding risk occurs when rock strength is less than 7,250 psi, and the ratio of shear modulus to the bulk compressibility is less than 0.8 1012 psi2. As the rock strength is increased, the sand free drawdown and depletion becomes larger. The CDDP
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More