Preferred Language
Articles
/
alkej-148
Experimental Investigation of Using Evaporative Air Cooler for Winter Air-Conditioning in Baghdad
...Show More Authors

This paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was  (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, saturation efficiency of DEC, outlet temperature of air and cooling capacity. Heat transfer rate in heat exchanger mode is also estimated. The paper presents the mathematical development of the equations of thermal exchanges through DEC and HE. prediction of air condition that exits o this system show that the present system could bring the air stream to a comfortable winter zone .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 03 2019
Journal Name
مجلة الجامعة العراقية
Justice in Christianity is descriptive
...Show More Authors

Justice is a human values that heavenly religions urged, and made her the fundamentals of individual and social and political life, in Allah almighty sent justice messengers, and sent down his books,as the Earth and the heavens with justice, it is a legal system in which a person takes his dues, which protect the rights of the individual And punish him when committing mistakes, so all religions to achieve chiefly Christianity, the Bible that Allah almighty qualities of Justice, and it is not affected by love or hate, and no factors or percentages, but granted to all who are on earth that despite money and prestige, or what was between them. Of affection or no matter, as well as injustice, whether unjustly or self for others, especially the

... Show More
Preview PDF
Publication Date
Fri May 01 2020
Journal Name
مجلة كلية الاداب
Humility in Christianity Descriptive Study
...Show More Authors

Humility is assign of the Purity of the soul and safety of the heart from the disease of pride and arrogance. It represents an important side of the formation of man's character and his behavior since it calls for love, intimacy and connection and a means to free the heart from the chains of envy and grudge. The word Humility (humbleness) appeared in the holy bible in many places. A accordingly, Christianity urged for sticking to it by its followers. The study aims at showing the meaning of humbleness, its importance and example of the humbleness of Jesus Christ (Peace be upon him) under the title (humbleness in Christianity/A Descriptions study). The paper falls into an introduction and three sections. The introduction talks about the mean

... Show More
Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ROLE OF CORPORATE GOVERNANCE IN PROTECTING INVESTORS' RIGHTS / ANALYTICAL STUDY IN THE IRAQI STOCK EXCHANGE: ROLE OF CORPORATE GOVERNANCE IN PROTECTING INVESTORS' RIGHTS / ANALYTICAL STUDY IN THE IRAQI STOCK EXCHANGE
...Show More Authors

The current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtai

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
USING SENSITIVITY ANALYSIS IN DETERMINING THE OPTIMAL&EFFICIENT PRODUCTION PLANS IN GREENHOUSES IN ASSOCIATION OF AL-WATAN UNDER CONDITION OF RISK &UNCERTAINTY
...Show More Authors

 The objectives of this research are to determine and find out the reality of crops structure of greenhouses in association of Al-Watan  in order to stand on the optimal use of economic resources available for the purpose of reaching a crop structure optimization of the farm that achieves maximize profit and gross and net farm incomes , using the method of linear programming to choose the farm optimal plan with the highest net income , as well as identifying production plans farm efficient with (income - deviation) optimal (E-A) of the Association and derived, which takes into account the margin risk wich derived from each plan using the model( MOTAD), as a model of models of linear programming alternative programming m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing reinforced Concrete Girders Using External Post-Tensioning
...Show More Authors

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
PIM-SM based Multicast Comparison for IPv4 verses IPv6 using GNS3 and JPERF
...Show More Authors

The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast technology implements varied protocols such as DVMRP(Distance Vector Multicast Routing Protocol), MOSPF(Multicast Open Shortest Path First), or PIM-DM (Protocol Independent Multicast- Dense Mode) which considered source tree type, while PIM-SM (Protocol Independent Multicast- Sparse Mode) and CBT (Core Based Tree) uses shared tree. Current paper focuses on the performance evaluation of the two multi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref