We claim that a proper subact Ṅ have been compactly packed (c.P) in generalization idea of c.P modules to S Acts. whether for all family of prime subact {Pα}(α∈λ) for some β∈λ Pβ ⊇ Ṅ when ∪(α∈λ)Pα, ⊇ N. We refer to an S-Act Ṁ as c.P. if every subact is compactly packed. We study various properties of c.P S-Acts.
In the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe present work deals with an experimental investigation of charging and discharging processes in thermal storage system using a phase change material PCM. Paraffin wax was used as the PCM which is formed in spherical capsules and packed in a cylindrical packed column which acted as an energy storage system. Air was used as the heat transfer fluid HTF in thermal storage unit. The effect of flow rate and inlet temperature of HTF on the time of charging and discharging process were studied. The results showed that the faster storage of thermal energy can be made by high flow rate of heat transfer fluid HTF and high inlet temperature of heat transfer fluid. It was found that at 65°C HTF inlet temperature, the melting and solidification pr
... Show MoreThis paper aims to study the effects of the long term solar activity on the critical frequencies of ionospheric F1 layer over Baghdad city, during the solar cycle 22, within (1988- 1995). It is found that the critical frequency of this layer is closely related to the sunspots number during the years of the solar cycle 22, at a middle latitude region of the world. The study discussed the effect of sunspot numbers and solar events on the electron densities of F1 layer, which is the most important ionospheric parameter.
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreAbstract
The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.
The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting
The
... Show MorePDBN Rashid, Multidisciplinary International Journal, 2023
KE Sharquie, MA Al-Dhalimi, AA Noaimi, HA Al-Sultany, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2
The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to
... Show More