Preferred Language
Articles
/
alkej-529
The Effects of Vortex Generator Types on Heat Transfer and Flow Structure in a Rectangular Duct Flows
...Show More Authors

    In this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt number. This study shows that the predicted structures of fluid flow, temperature fields and Nusselt number variation are strongly affected by the presence of the turbulators. Staggered arrangement gains high Nusselt number, also the lower and upper arrangements have higher Nusselt number than plane duct. High Reynolds number (higher air inlet velocity) will enhance the Nusselt number. Increase in ribs height will enhance the heat transfer as it works as surface area and turbulator at the same time. 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 02 2024
Journal Name
Eximia Journal
The role of strategic Renewal in organizational immunity - analytical research in the Iraqi Ministry of Education
...Show More Authors

The current study aims to demonstrate the role of strategic renewal in enhancing organizational immunity through strategic renewal mechanisms represented by (Reanimating, Rejuvenation, Venturing, and restructuring). The main idea of this study relates to the extent to which organizations’ immunity is achieved through strategic Renewal mechanisms, by measuring these dimensions with Organizational immunity represented by organizational learning, organizational memory, and organizational DNA. The study population was the headquarters of the Iraqi Ministry of Education, and the sample included (330) individuals from the upper, middle, and lower leadership levels. Several statistical methods were used to deal with the results of the questionna

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Effect of Cloud Computing in Facing the Challenges of Applying IFRSs in Iraqi Private Banks
...Show More Authors

The research aims to explain the role of cloud computing technology in facilitating the application of international financial reporting standards in Iraqi banks, by preparing a checklist that included a set of paragraphs to measure the level of application of IFRSs. In those banks and then the need to use cloud computing technology, and the researchers reached a set of conclusions, including, that cloud computing technology has a role in facilitating the application of international financial reporting standards in the banks, the research sample, because of the ease it provides in preparing and saving accounting information and the possibility of accessing it in any time and from any place where the Internet service is available. T

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Medico-legal Update
Effect of Some Alcoholic Extracts in Reducing the Fat Content of the Liver Tissue in Rat.
...Show More Authors

Objective: This research was carried out in rats in a special place of the laboratory of histopathological diseases in the period 6/9/2018 until 23/11/2018, this study to detect effect of the addition of the alcohol extract of ginger in the reduction of fat in liver tissue of rats. Method: Eight groups and replicates for each group. The groups were homogenous in weights and were placed in 13 cages. Each group consisted of 10 rat and at 5 fares each. In the first treatment, rat were fed on regular feeding without adding and feeding rats in the second treatment sessions add to it the alcoholic extract of ginger in Turkey 150 mg/kg. The third group is the same as the normal food after adding the alcohol extract of ginger at a concentration of

... Show More
Publication Date
Fri Dec 13 2024
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic sensitivity in organizational immunity - analytical research in the Iraqi Ministry of Education
...Show More Authors

The current research aims to find out the effect of strategic sensitivity in enhancing organizational immunity at the leadership levels in the Iraqi Ministry of Education, as the strategic sensitivity variable includes two dimensions (strategic foresight and strategic Insight), and the organizational immunity variable addresses three dimensions (organizational learning, organizational memory and organizational DNA). The main purpose of this research was related to the extent to which the Ministry’s immunity was achieved through the role played by strategic sensitivity. A sample of (349) individuals was selected . The questionnaire was relied upon to collect data, and the number of questionnaires suitable for analysis was (330). Re

... Show More
View Publication
Crossref
Publication Date
Wed Feb 18 2026
Journal Name
Al-fatih Journal
Impact exercises sense of the power arm in the level of performance skill in basketball clapotement
...Show More Authors

أن كرة السلة بما تتضمنه من مهارات حركية متنوعة تتطلب من ممارسيها امتلاك عدد من القدرات الحركية الخاصة وبشكل خاص التوافق العضلي العصبي والرشاقة والقوة المميزة بالسرعة، فضلاعن قدرات الإدراك الحس- حركي (إدراك المكان وقوة دفع الكرة سواء بالطبطبة العالية أو الواطئة .... الخ ) لذا تكمن أهمية البحث في إيجاد الطرق والوسائل التي تطور قدرة الطالبة على إدراك قوة دفع الكرة والإحساس بها أثناء تعلم وتدريب الطبطبة بأنواعها ب

... Show More
View Publication
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Images of ruin in "Throne" and " Water stream" by Maysaloon Hadi and "War" by Glezio: A Compartive Study: Les images du débris dans "Le trône et le ruisseau " de Maysaloon Hadi et "La guerre" de Le Glézio (étude comparative)
...Show More Authors

Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today. 

Résumé

Notre recherche abord un des points inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref