Preferred Language
Articles
/
SxbJZooBVTCNdQwCmZ0J
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Convective Heat Transfer of Fluid Flowing Across a Vertical Plate
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Numerical Simulation of Natural Convection Heat Transfer from Interrupted Rectangular Fins
...Show More Authors

      Numerical simulations have been investigated to study the external free convective heat transfer from a vertically rectangular interrupted fin arrays. The continuity, Naver-Stockes and energy equations have been solved for steady-state, incompressible, two dimensional, laminar with Boussiuesq approximation by Fluent 15 software. The performance of interrupted fins was evaluated to gain the optimum ratio of interrupted length to fin length (

View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Investigation of heat transfer phenomena and flow behavior around electronic chip
...Show More Authors

Computational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 21 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Study of the Heat Transfer Behavior in Helical Microcoil Tube
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of marketing tools on the legal liquidity index : an applied research in the International Development Bank for Investment and Finance
...Show More Authors

Abstract

               The main problem of the study lies in the lack of a clear perception among the study sample about the impact of digital marketing tools on legal liquidity. Legal) of the International Development Bank for Investment and Finance and to achieve the objectives of the research, the method of observation and survey was used in measuring the dimensions of digital marketing. As for banking liquidity, the reports and financial statements of the bank were used as the research sample, as well as the use of the statistical analysis program SPSS in the statement of the relationship The study concluded, in summary, the following: Mar

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 09 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The financial aid of the Central Bank of Iraq to the government and its reflection on indicators of banking stability/ Applied Research
...Show More Authors

The research aims to define the images of financial aid that it provides within their tasks (central banks to governments) and how it can affect the indicators of banking stability, as well as monitoring the levels of banking stability in the Iraqi economy through the indicators used by the Central Bank of Iraq, and the importance of research in banking stability lies in Iraq, because any decrease in the movement of the aggregate banking stability index will reflect negatively on the financial sector in Iraq. Therefore, the Central Bank sought to provide financial aid to the government through a group of components, some of which are represented by initiatives that contribute to revitalizing the national economy and the other hel

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF