Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Experimental Investigation of Heat Transfer Enhancement in a Double Pipe Heat Exchanger Using Compound Technique of Transverse Vibration and Inclination Angle
...Show More Authors

Numerous tests are recently conducted to assess vibration's role in accelerating the heat transfer rate in various heat exchangers. In this work, the enhancement of heat transfer by the effect of transfer vibration and inclination angles on the surface of a double pipe heat exchanger experimentally has been investigated. A data acquisition system is applied to record the data of temperatures, flow rates, and frequencies over the tests. A compound technique was adopted, including the application of a set of inclination angles of (0°, 10°, 20°, and 30°) under the effect of frequency of vibration ranging from sub-resonance to over-resonance frequencies. The results showed that the overall heat transfer coefficient enhan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement

... Show More
Crossref (2)
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Impact of a Proposed Strategy According to Luria’s Model in Realistic Thinking and Achievement in Mathematics
...Show More Authors

The research aims to find the impact of a proposed strategy according to the Luria model on realistic thinking among fifth-class scientific students and their achievement in mathematics. To achieve it, the experimental research method and the quasi-experimental design were used for two equal groups, one of them is a control group taught in traditional way and the other is an experimental one taught according to strategy based on Luria model. The research community represents the students of the fifth scientific class from the General Directorate of Education of Karkh First. The research sample (40) students were deliberately chosen and distributed equally between the two groups after making sure that they were equals in their previo

... Show More
View Publication
Scopus (13)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A proposed model for disclosing the role of the collective intelligence system in improving joint auditing
...Show More Authors

This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”   

The proposed model is designed for the disclosure of joint auditing and the role

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Effectiveness of the Symbol in Iraqi Monodrama Texts: محمد علي ابراهيم
...Show More Authors

This research studies the effectiveness of the symbol in the Iraqi monodrama texts. The methodological framework is devoted to the research problem and the need for conducting it, its importance, the purpose of research, and the definition of the most important terms. The research problem dealt with the concept of the effectiveness of the symbol, the monodrama, and the working levels of the symbol in the monodrama texts of the author, in addition to the disclosure of the artistic vision embodied by the playwright in the use of the symbol within the literary product, as well as the development of the creative process. The research problem was defined by the following question: How effective is the symbol in the Iraqi Monodrama texts?
T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 22 2019
Journal Name
Journal Of The College Of Education For Women
Heritage in Abdul Wahab Al-Bayati's Divan Collection of Poems: Oriental Texts
...Show More Authors

Heritage reflects peoples' memory and essence of nations. Thus, this divan was really the material and tool for writers in general and poets in specific both in their artificial innovations . Accordingly, modern writers have endeavored to bring heritage back in all its details and occurrences. Abdullwahab Al-Bayati's experience had reflected his innovative and strong link with the humanitarian heritage, in that heritage in view of Al-Bayati means both the humanitarian expertise and gains that are able to extend from past to future passing through the present.From this, the poet had not disconnected his strong link with the Arab poetic heritage .Thus, the poet had utilized the Arab poetic heritage in expressing on the Arab contrary realit

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 05 2017
Journal Name
Asian Journal Of Biological And Life Sciences
Bioethanol Production from Banana Peels using Different Pretreatments
...Show More Authors