Preferred Language
Articles
/
alkej-566
Analysis of Wave Propagation in Detection of Aorta Dieses Using Lumps Analysis
...Show More Authors

In this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement.  The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 06 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF IRON AVAILABITITY OF WHEAT FLOUR PRODUCED IN BAGHDAD CITY MILLS: DETECTION OF IRON AVAILABITITY OF WHEAT FLOUR PRODUCED IN BAGHDAD CITY MILLS
...Show More Authors

In the present study, a total of 245 flour samples were collected from 49 mills on both sides of Baghdad city (Al- Karkh and Al- Resafa), during the period from 1/6 - 1/12/ 2015 to detect the prolportion of iron added to the flour samples. It is found that only 45% of mills produced flour contain the prescribed percentage of iron (30-60 ppm) while 51.9% of the mills produced flour at rate is less or much more than the prescribed percentage, while only 4.1% of the mills were not added iron to the flour.

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Vibration Measurement and Analysis of knee-Ankle-Foot Orthosis (KAFO) Metal-Metal type
...Show More Authors

This paper deals with calculate stresses in Knee-Ankle-Foot-Orthosis as a result of the effect vibration during gait cycle for patient wearing KAFO .Experimental part included measurement interface pressure between KAFO and leg due to action muscles and body weigh on Orthosis. also measurement acceleration result from motion of defected leg by accelerometer .Results of Experimental part used input in theoretical part so as to calculate stresses result from applying pressure and acceleration on KAFO by engineering analysis program ANSYS 14.Resultes show stresses values in upper KAFO greater than lower KAFO that is back to muscles more effective in thigh part lead to recoding pressure higher than pressure in shank part.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Entransy dissipation of Shell and Double Concentric Tube Heat Exchanger Calculations and Analysis
...Show More Authors

Shell-and-double concentric tube heat exchanger is one of the new designs that enhance the heat transfer process. Entransy dissipation is a recent development that incorporates thermodynamics in the design and optimization of heat exchangers. In this paper the concept of entransy dissipation is related to the shell-and-double concentric tube heat exchanger for the first time, where the experiments were conducted using hot oil with temperature of 80, 100 and 120°C, flow rate of cold water was 0.667, 1, and 1.334 kg/m3 respectively and the temperature of inlet cold water was 20°C. The entransy dissipation rate due to heat transfer and to fluid friction or pressure drop was studied.

 

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Thermal Analysis and Structural Studies of New Complexes with Tetradentate Ligand
...Show More Authors

Some new complexes of 4-(5-(1,5-dimethyl-3-oxo-2-phenyl pyrazolidin-4- ylimino)-3,3-dimethyl cyclohexylideneamino) -1,5- dimethyl-2- phenyl -1H- pyrazol -3(2H) –one (L) with Mn(II), Fe(III), Co(II), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) were prepared. The ligand and its metal complexes were characterized by phisco- chemical spectroscopic techniques. The spectral data were suggested that the (L) as a neutral tetradentate ligand is coordinated with the metal ions through two nitrogen and two oxygen atoms. These studies revealed Octahedral geometries for all metal complexes, except square planar for Pd(II) complex. Moreover, the thermodynamic activation parameters, such as ?E*, ?H, ?S, ?G and K are calculated from the TGA curves using Coa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Performance Analysis of Four Conceptual Designs for the Air Based Photovoltaic / Thermal Collectors
...Show More Authors

The  thermal  and  electrical  performance  of  different  designs  of  air  based  hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
2nd International Conference On Materials Engineering & Science (iconmeas 2019)
FEM analysis and design of permanent magnet disk type magneto-rheological (MR) valve
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression existence of multicolleniarty problem(Empirical Study on Anemia)
...Show More Authors

The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search the comparison between binary lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref