Numerous tests are recently conducted to assess vibration's role in accelerating the heat transfer rate in various heat exchangers. In this work, the enhancement of heat transfer by the effect of transfer vibration and inclination angles on the surface of a double pipe heat exchanger experimentally has been investigated. A data acquisition system is applied to record the data of temperatures, flow rates, and frequencies over the tests. A compound technique was adopted, including the application of a set of inclination angles of (0°, 10°, 20°, and 30°) under the effect of frequency of vibration ranging from sub-resonance to over-resonance frequencies. The results showed that the overall heat transfer coefficient enhan
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement
... Show MoreThe research aims to find the impact of a proposed strategy according to the Luria model on realistic thinking among fifth-class scientific students and their achievement in mathematics. To achieve it, the experimental research method and the quasi-experimental design were used for two equal groups, one of them is a control group taught in traditional way and the other is an experimental one taught according to strategy based on Luria model. The research community represents the students of the fifth scientific class from the General Directorate of Education of Karkh First. The research sample (40) students were deliberately chosen and distributed equally between the two groups after making sure that they were equals in their previo
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreThis research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreThis research studies the effectiveness of the symbol in the Iraqi monodrama texts. The methodological framework is devoted to the research problem and the need for conducting it, its importance, the purpose of research, and the definition of the most important terms. The research problem dealt with the concept of the effectiveness of the symbol, the monodrama, and the working levels of the symbol in the monodrama texts of the author, in addition to the disclosure of the artistic vision embodied by the playwright in the use of the symbol within the literary product, as well as the development of the creative process. The research problem was defined by the following question: How effective is the symbol in the Iraqi Monodrama texts?
T
Heritage reflects peoples' memory and essence of nations. Thus, this divan was really the material and tool for writers in general and poets in specific both in their artificial innovations . Accordingly, modern writers have endeavored to bring heritage back in all its details and occurrences. Abdullwahab Al-Bayati's experience had reflected his innovative and strong link with the humanitarian heritage, in that heritage in view of Al-Bayati means both the humanitarian expertise and gains that are able to extend from past to future passing through the present.From this, the poet had not disconnected his strong link with the Arab poetic heritage .Thus, the poet had utilized the Arab poetic heritage in expressing on the Arab contrary realit
... Show MoreAs a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put
... Show More