Preferred Language
Articles
/
alkej-468
Basement Kind Effects on Air Temperature of a Solar Chimney in Baghdad - Iraq Weather
...Show More Authors

A solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar

air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.

 

 This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.

The results show that the best chimney efficiency attained was 49.7% for pebbles base. The highest collected air temperature reached was 49ºC when using the black pebbles basement also.also, the maximum basement temperature measured was 59ºC for black pebbles. High increaments in collected air temperatures were achieved in comparison with the ambient air temperatures for the three basement kinds. The highest temperature difference reached was 22ºC with the pebble ground.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Ability of the Independent Auditor to Audit the Application Requirements of Electronic Commerce
...Show More Authors

The purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.

The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Artistic Integration of Aesthetic Manifestations in the Andalusian Islamic Style into the Interior Architecture (Mansour Laalaj's Door / Meknes a Case Study): شهريار عبد القادر محمود -سعد جرجيس
...Show More Authors

The Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.    

Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
مجلة الحقوق كلية القانون الجامعة المستنصرية
اثر انعدام الاهلية على الشركة التضامنية
...Show More Authors

اثر انعدام الاهلية على الشركة التضامنية

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 02 2022
Journal Name
الجامعة العراقية
الحاجات الارشادية وعلاقتها بالانفتاح على الخبرة
...Show More Authors

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Containerized Event-Driven Microservice Architecture
...Show More Authors

Microservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jul 01 2010
Journal Name
Political Sciences Journal
ملاحظات اولية على قانون الانتخابات ونتاجاتها
...Show More Authors

ملاحظات اولية على قانون الانتخابات ونتائجها

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Imam Jaafar Al-sadiq University Journal Of Human And Social Sciences
The Harm Resulting from Promoting Extremist Ideas
...Show More Authors

The freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This be

... Show More
View Publication