Preferred Language
Articles
/
Uhdz_o0BVTCNdQwCGCyJ
Double cross-over and cross-over with extra period designs -comparative study-
...Show More Authors

The goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.

Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
A GENERAL VELOCITY PROFILE FOR A LAMINAR BOUNDARY LAYER OVER FLAT PLATE WITH ZERO INCIDENCE
...Show More Authors

A general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
International Journal Of Interdisciplinary Telecommunications And Networking
Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks
...Show More Authors

Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro

... Show More
View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Thu May 01 2025
Journal Name
Journal Of Engineering
Transient Response Investigation of Cross-Ply Plates Using Refined Theory
...Show More Authors

Response of cross-ply plates subjected to transient load is obtained using five variables refined plate theory, and four variables plate theory. Equations of motion are derived through the principleof virtual work. Navier series used for simply supported laminated plates. The results of this work are presented for different parameters, such as the ply number, thickness, and modulus ratio with mechanical load (sinusoidal and step pulses), which are compared with those obtained using high-order shear plate theory. Five variables of refined plate theory give results that are considerably different from the four variables of refined plate theory and higher-order theory. The obtained results from the four variables theory have the same behavior

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Structural Modeling of Cross-Frame Behavior in Steel Girder Bridges
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of students' knowledge about environmental health in College of Health and Medical Technology: A Cross-Sectional study
...Show More Authors

Objective: the aim of this study is to determine the level of students' knowledge about the environmental health.
Methodology: The cross-sectional study was conducted at the College of Health and Medical Technology in Baghdad
city during the period from 1st march till 1st of July 2012. Data was collected by self-recording of a previously designed
questionnaire to obtain socio-demographic information such as (age, gender, department, year of grade).
Results: The highest rate of students were in the 2nd year followed by the 3rd year, highest rate of students had low
level of knowledge followed by intermediate level of knowledge, while lowest rate of students on had high level of
knowledge .Females had higher level of know

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study of Doppler broadening Compton scattering and cross section determination for the elements Fe, Zn, Ag, Au and Hg
...Show More Authors

To assess the contribution of Doppler broadening and examine the
Compton profile, the Compton energy absorption cross sections are
measured and calculated using formulas based on a relativistic
impulse approximation. The Compton energy-absorption cross
sections are evaluated for different elements (Fe, Zn, Ag, Au and Hg)
and for a photon energy range (1 - 100 keV). With using these crosssections,
the Compton component of the mass–energy absorption
coefficient was derived, where the electron momentum prior to the
scattering event caused a Doppler broadening of the Compton line.
Also, the momentum resolution function was evaluated in terms of
incident and scattered photon energy and scattering angle. The res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 16 2023
Journal Name
F1000research
Assessment of general population knowledge, attitude, and practice on safe unused and expired drugs disposal: a cross-sectional study
...Show More Authors

Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa

... Show More
Scopus (5)
Crossref (8)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Flow Over the Spillway of AlAdhiam Dam Under Gated Condition
...Show More Authors

The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of internal control system over according misleading accounting information
...Show More Authors

Abstract

The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.

The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting

The

... Show More
View Publication Preview PDF
Crossref