Preferred Language
Articles
/
SxZSU4cBVTCNdQwCMUWP
Numerical Investigation of Drag Reduction Techniques in a Car Model
...Show More Authors
Abstract<p>Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×10<sup>5</sup>, 5.23×10<sup>5</sup>, 7.85×10<sup>5</sup> and 10.46×10<sup>5</sup>), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solving Reynolds-averaged Navier-tokes equations (RANS) using a realizable k–epsilon (k-ε) turbulence model, conducted on a car, model KIA Pride, which is popular in Iraq and Iran. All computational analysis and modifications were carried out using the ANSYS Fluent 19 computational fluid dynamics (CFD) software and SOLIDWORKS 2018 modeller. The drag coefficient of the analysed car was found to be 0.34 and the results show that the drag can be reduced up to1.73% using vortex generators, up to 3.05% using a rear wing spoiler and up to 2.47% using rear under-body diffuser slices modifications, whereas it may be reduced up to 3.8% using all previous modifications together.</p>
Scopus Crossref
View Publication
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
J. Pharm. Sci. & Res.
Synthesis of coumarin by Pechman reaction - A Review
...Show More Authors

Phenol condensed with β-keto esters via Pechmann condensation to form derivatives of Coumarin in various reaction conditions by two ways. Present paper is comparative study of synthesis Coumarin with the yield of product , reaction time and reaction conditions.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Microbiological studies of a new naphthoquinone semicarbazone derivatives
...Show More Authors

The antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).

View Publication Preview PDF
Publication Date
Thu Nov 01 2001
Journal Name
Renewable Energy
Optoelectronic properties of a-Si1−xGex:H thin films
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 09 2014
Journal Name
Journal Of The College Of Education For Women
A Stylistic Analysis of Bisson’s Bears Discover Fire
...Show More Authors

This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed May 12 2021
Journal Name
Journal Of Biotechnology Research Center
A review of the Common Food-borne Viruses
...Show More Authors

Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Route Educational And Social Science Journal
A POSTMODERNIST READING OF KURT VONNEGUT’S SLAUGHTERHOUSE-FIVE
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Design and evalution of a solar PV system
...Show More Authors

PV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building   220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien

... Show More
View Publication Preview PDF
Crossref