Preferred Language
Articles
/
alkej-298
Numerical Simulation of the Collector Angle Effect on the Performance of the Solar Chimney Power Plant
...Show More Authors

Sloped solar chimney system is a solar chimney power plant with a sloped collector. Practically, the sloped collector can function as a chimney, then the chimney height can be reduced and the construction cost would be reduced.The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady, turbulent standard model with Boussiuesq approximation  to develop for the sloped solar chimney system in this study and evaluate the performance of solar chimney power plant  in Baghdad city of Iraq numerically by Fluent (14) software with orking conditions such as solar radiation intensity (300,450,600,750 and 900 W/m2), and collector which angle (0°, 15° and 30°).The results show that the change of collector angle has considerable effects on the performance of the system.The velocity increases when the collector angle increases and reach to the maximize  value at a collector angle (30°). The temperature increase with the collector tile angle increase at solar intensity times (7:30,8:15,9,10 AM) but decrease at 12:30 PM) corresponding to solar intensitIes. The study show that Iraqi wather are suitable for this system.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Two Educational Models in Acquiring Historical Concepts and Orientation of Fourth Grade Students in History
...Show More Authors

The study focuses on Kamez model and the Claus Meyer model of instructional design, which are models that provide the learner with educational experiences to suit the logical information of the learner and the variety of instructional models. Research Objective: The present research aims to identify Limitations of the study. The current research is determined by ((fourth grade preparatory students, the book of the date of the fourth preparatory course)) Chapter II includes Arabic and foreign studies on the model of Kemp and Claus Mayer in the acquisition of concepts and direction towards the material. Chapter III Experimental Design: The researcher adopted an experimental design with two experimental groups and a control group. The resea

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Detailed interpretation of Sheikh Abdullah Knon A look at the curriculum and method of innovation Critical inductive study
...Show More Authors

The problem lies in the main research Where the site of this interpretation of the books of interpretation and what is new and how?
The objectives of this research Vjat to give a quick overview of Sheikh Kenon and the qualifications that made him interpreter, as the goal of the research to reveal the method of Sheikh Kenon highlighting what he has and what is new and show.
The researcher used the inductive method to read the whole book and the comparative approach to compare it with others. He also used the critical method to distinguish between the positions of strength and weakness in the book. The most important results are as follows: :
1 - Sheikh Abdullah Kenon language writer familiar with many sciences, such as jurisprude

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Woman’s Identity Crisis in the Clash of Cultures: A Study of Betool Khedairi’s Novel: A Sky So close
...Show More Authors

This paper is an attempt to clarify the impact of Postcolonialism, one of the most
challenging fields of study that has emerged in recent years, on representations of women in
once-colonised countries and in Western locations. It discusses the influence of cultural
differences on the status and identity of a woman who experience ‗multiculturalism‘. The
study is an analytical reading of a contemporary novel written by the Iraqi writer Betool Al-
Kudairi. The emphasis lies on the clash between two different cultures and traditions
represented by the British mother and the Iraqi father and its effect on the life and identity of
the protagonist. The main focus is on idea of ‗hybrid identity‘ and the absence of th

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of the actual reality of supply chain operations in Noor Al-Kafeel Food Products Company/ case study.
...Show More Authors

Abstract:

                This research aims to identify the actual reality of the supply chain processes applied in the Noor Al-Kafeel Food Products Company, which was chosen as a research sample by measuring the application and documentation gap. The current research relies on the case study method to reach the desired results, and the seven-scale scale was relied on to identify the reality of the supply chain operations applied in the researched company and the use of quantitative and qualitative methods in data collection and analysis, as quantitative methods such as the arithmetic mean were used weighted, percentage measurement, and g

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Red Ginger's Anti-Anxiety Effect on BALB/c Strain Mice (Mus musculus) Pro-Inflammatory and Anti-Inflammatory Measurements as Anxiety Model
...Show More Authors

There is a correlation between the occurrence of anxiety and the production of inflammatory mediators, and red ginger rhizome is a well-known herbal product with a high content of phenolic and flavonoid compounds that can be used as anti-inflammatories and antioxidants. The aim of study to evaluate the effect of red ginger as antianxiety in mice (Mus musculus) BALB/c strain by measuring levels of TNF-α, IL-6 and IL-10.  Anxiety model mice were carried out by giving treatment with the Forced Swimming Test (FST) for 7 days then assessed by carrying out the Elevated Plus Maze for Mice (EPM) test for one day. After the treatment, the anxiety mice model was made, followed by administration of red ginger ethanol extract therapy for 14 days.

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

View Publication Preview PDF
Scopus (47)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Fri Nov 10 2017
Journal Name
Al–bahith Al–a'alami
The Relation of Results to Objectives of Media Research – an Evaluative: Study of Research of al-Baath al-iilami Journal from 2007 to 2016
...Show More Authors

The main idea of this research is that the researcher believes that media research remains useless unless its goals and results are achieved by using the correct scientific tools. The researcher chooses 100 research papers of about 35% of the published ones, 10 of them are excluded because they are outside media. We use a simple and randomized sample including the three departments of media: journalism, television and radio journalism and public relations. The researcher adopts statistical methods such as Fay coefficient, correlation coefficient, Pearson correlation coefficient and straight line equation.
The researcher uses an analytical form followed by analysis of content, them the scale. The results are found in 58 researches, w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2025
Journal Name
مجلة القادسية للقانون والعلوم السياسية
Unlawful Risk Insurance: Towards a Reinterpretation of Public Order in Light of the Protection of Innocent Victims and Freedom of Contract
...Show More Authors

The issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve

... Show More
View Publication
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref