Preferred Language
Articles
/
alkej-212
Energy Saving of Heat Gain by Using Buried Pipe Inside a Roof
...Show More Authors

Abstract

    This work deals with a numerical investigation to evaluate the utilization of a water pipe buried inside a roof to reduce the heat gain and minimize the transmission of heat energy inside the conditioning space in summer season.     The numerical results of this paper showed that the reduction in heat gain and energy saving could be occurred with specific values of parameters, like the number of pipes per square meter, the ratio of pipe diameter to the roof thickness, and the pipe inlet water temperature. Comparing with a normal roof (without pipes), the results indicated a significant reduction in energy heat gain which is about 37.8% when the number of pipes per meter of roof length is 3.0 , the ratio of pipe diameter to the wall thickness (D/W) is 0.20, and the water inlet temperature is 30°C, while the minimum ratio of reduction 24% is achieved when the number of pipes per meter, the ratio of pipe diameter to the wall thickness, and the water inlet temperature are 27, 30 and 33 °C, respectively. The results also showed that there is a very small effect of pipe centre position inside the wall on the final heat transmission.

Keyword: Water pipe, Roof heat gain, Solar-air temperature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
...Show More Authors

Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jul 17 2025
Journal Name
Journal Of Engineering
Aerodynamic Characteristics of a Rectangular Wing Using Non-Linear Vortex Ring Method
...Show More Authors

The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of

... Show More
View Publication
Publication Date
Sun Jan 01 2012
Journal Name
كلية التربية-الجامعة المستنصرية
Study the diffusion of Hydrogen in metals using a Runge-Kutta method
...Show More Authors

Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Controlling the wavelength of a high power diode laser using thermoelectric cooler
...Show More Authors

The present work includes a design and characteristics study of a controlling the wavelength of high power diode laser by thermoelectric cooler [TEC] . The work includes the operation of the [TEC] to control the temperature of the diode laser between ( 0- +30) °C by changing the resistance of thermistor. We can control a limited temperature of a diode laser by changing the phase cooling between hot and cold faces of the diode, this process can be attempted by comparator type [LM –311] .The theoretical results give a model for controlling the temperature with, the suitable wavelength.

View Publication Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Mathematics For Applications
DIRICHLET PROCESS ANALYSIS USING BIORTHOGONAL WAVELET: A STATISTICAL STUDY OF FINANCIAL MARKET
...Show More Authors

The Dirichlet process is an important fundamental object in nonparametric Bayesian modelling, applied to a wide range of problems in machine learning, statistics, and bioinformatics, among other fields. This flexible stochastic process models rich data structures with unknown or evolving number of clusters. It is a valuable tool for encoding the true complexity of real-world data in computer models. Our results show that the Dirichlet process improves, both in distribution density and in signal-to-noise ratio, with larger sample size; achieves slow decay rate to its base distribution; has improved convergence and stability; and thrives with a Gaussian base distribution, which is much better than the Gamma distribution. The performance depen

... Show More
View Publication
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
A research taken from Dissertation " Artistic Expression by painting among Kindergarten child"
...Show More Authors

The current study aims to identify the artistic expression as well as the aspects of artistic expression by the painting among the kindergarten children. In order to fulfill the research's goals, a sample of (400) children were chosen randomly from 19 public kindergartens of 6 directorates at Al-Rusafa and Al-Karkh in Baghdad city. The children were asked to draw a particular view. The researcher  has adopted  Al-Hamedawi scale  (2009) consisted of  (16) items, which was exposed to group of (25) experts in  psychology, education,  measurement and evaluation,  artistic  education by painting  and plastics  to show  the items reliability. As the researcher applied T-test  for&nbsp

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Folic Acid With Fluorene: A Complexation Study by UV and FTIR Spectroscopies
...Show More Authors

The complexation between folic acid and a typical polyaromatic hydrocarbon, fluorene, was investigated using FTIR and UV spectra. Appearance of a new IR band at 2401cm−1 demonstrates that NH2–C=N moiety on pterin ring in folic acid is protonated when fluorene is introduced. The emergence of two charge transfer bands at 217 nm and 278 nm in UV difference spectra shows the presence of π-π complexation between folic acid and fluorene. These experiments confirm that fluorene could combine with the pterin ring of folic acid through π-π donor–acceptor interaction and induce the protonation process in folic acid upon strengthening electron accepting ability of pterin ring. The results suggest that complexatio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref