Preferred Language
Articles
/
alkej-126
An Experimental Study on the Effect of Shape and Location of Vortex Generators Ahead of a Heat Exchanger
...Show More Authors

An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .

In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.                     

The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found to be the best shape for enhancing heat transfer at location [Xm=0.5 cm] distance before heat exchanger is the best location for enhancing heat transfer. The square is the best shape for enhancing heat transfer at location [Xm=2.5 cm] distance before heat exchanger is the best location for enhancing heat transfer.

The results of flow over heat exchanger with vortex generators are compared with the flow over heat exchanger without vortex generators. Heat transfer around heat exchanger is enhanced (56%, 50%, 36%) at location            (X=0.5, 1.5, 2.5cm) respectively by using circular vortex generators without turbulator and heat transfer around heat exchanger is enhanced (39%, 42%, 51%) at location (X=0.5, 1.5, 2.5cm) respectively by using square shape vortex generators without turbulator.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Secret-Text by e-Abacus Diagram II
...Show More Authors

In this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory

View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Secret-Word by e-Abacus Diagram I
...Show More Authors

This experiment may be applied before with certain and special roles, but never applied under partition theory (Abacus James Diagram) conditions. Therefore, we would have to find an appropriate design for each character to enable us sending a word represented as increasing number with meaning only for beneficiaries.

View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Some innovative word-formation processes in popular Internet texts in Russian and Arabic: Некоторые Инновационные словообразовательные процессы в популярных интернет-текстах в русском и арабском языках
...Show More Authors

       The present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Procedimientos de traducción de los nombres propios del árabe al español: Fundamentos y Aplicaciones Procedures for translating proper noun from Arabic into Spanish: Fundamentals and Applications
...Show More Authors

Los nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción  de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería enton­ces cuestión de modas. Pero, eviden

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Dorsal plication during penile orthoplasty with and without neurovascular bundle mobilizationA comparative clinical trial conducted At Ghazy Al-Hariri teaching hospital for surgical specialties (2013 –2015)
...Show More Authors

Background: Dorsal plication on each side of the penis at the 2 and 10-o’clock positions had been a mainstay for correction of ventral penile curvature. However, because only the 12-o’clock position proved to be a nerve-free zone, dorsal plication at the 12-o’clock position can be advocated.

Objectives: To evaluate tunica albuginea plication with and without neurovascular bundle mobilization in patients with ventral penile curvature. Type of the study: A prospective study.

Methods: A 34 patients with a mean age of (4.8 ± 0.54) years, Who still

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Mixed Implicit Galerkin – Frank Wolf, Gradient and Gradient Projection Methods for Solving Classical Optimal Control Problem Governed by Variable Coefficients, Linear Hyperbolic, Boundary Value Problem
...Show More Authors

This paper deals with testing a numerical solution for the discrete classical optimal control problem governed by a linear hyperbolic boundary value problem with variable coefficients. When the discrete classical control is fixed, the proof of the existence and uniqueness theorem for the discrete solution of the discrete weak form is achieved. The existence theorem for the discrete classical optimal control and the necessary conditions for optimality of the problem are proved under suitable assumptions. The discrete classical optimal control problem (DCOCP) is solved by using the mixed Galerkin finite element method to find the solution of the discrete weak form (discrete state). Also, it is used to find the solution for the discrete adj

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Minimum Instream Environmental Flow in Shatt Al-Hillah River
...Show More Authors

To maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, wer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref