Preferred Language
Articles
/
alkej-529
The Effects of Vortex Generator Types on Heat Transfer and Flow Structure in a Rectangular Duct Flows
...Show More Authors

    In this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt number. This study shows that the predicted structures of fluid flow, temperature fields and Nusselt number variation are strongly affected by the presence of the turbulators. Staggered arrangement gains high Nusselt number, also the lower and upper arrangements have higher Nusselt number than plane duct. High Reynolds number (higher air inlet velocity) will enhance the Nusselt number. Increase in ribs height will enhance the heat transfer as it works as surface area and turbulator at the same time. 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fibrewise Lindelöf and Locally Lindelöf Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B

... Show More
Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS ON SALTICIDAE AND THERIDIIDAE (ARANEAE) SPIDERS FROM ARMENIA
...Show More Authors

New data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu May 15 2025
Journal Name
Al–bahith Al–a'alami
Effectiveness of Dialogic Communication in Online Public Relations with an Audience : (Analytical Study of the Websites of Universities in UAE)
...Show More Authors

The Study addressed the effectiveness of dialogic communication in online public relations with an audience of higher education institutions in the United Arab Emirates. The study aimed to know about the interest extent of higher education institutions through their websites with the elements of dialogic communication in online public relations to communicate with their audience. The researcher used survey methodology and content Analysis tool as an essential tool for collecting information. Some of the important results of the study are: The websites of higher education institutions in terms of indicators of ease of use; the main links on the websites are clearly available on the opening page, there is a map on the websites, reduce depe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Semantic Operation of Place in the Legendary Movie: حيدر وسم صالح
...Show More Authors

Place is considered one of the important artistic elements in the movie through which the events occur in different arts and literatures and with its absence there isn’t any that can initiate events. Place is important for the things that we recognize, and the first fact in cinema is the place which can't be dispensed with on the level of the film or scene or cinematic shot that can't be emptied from its spatial content. The characters are always there in a place occupying some space of it, despite that it is not merely a container for the event cinematically. The researcher views the importance of discovering and observing them in this research which is divided into four chapters as follows: (theoretical framework) which includes the

... Show More
View Publication Preview PDF
Crossref