Preferred Language
Articles
/
bsj-3782
Numerical Analysis of Least-Squares Group Finite Element Method for Coupled Burgers' Problem
...Show More Authors

In this paper, a least squares group finite element method for solving coupled Burgers' problem in   2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved.  The theoretical results  show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the efficiency of the proposed method that are solved through implementation in MATLAB R2018a.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering Science And Technology
NUMERICAL SIMULATION OF SHEET PILES AS A SEEPAGE CUTTER OFF: AL-KIFIL REGULATOR AS A CASE STUDY
...Show More Authors

Sheet piles are necessary with hydraulic structures as seepage cut-off to reduce the seepage. In this research, the computational work methodology was followed by building a numerical model using Geo-Studio program to check the efficiency of using concrete sheet piles as a cut-off or reducer for seepage with time if the sheet piles facing the drawdown technique. Al-Kifil regulator was chosen as a case study, an accurate model was built with a help of observed reading of the measuring devices, which was satisfactory and helped in checking the sheet piles efficiency. Through the study, three scenarios were adopted (with and without) drawdown technique, it was found that at the short time there's no effect of the drawdown technique on

... Show More
View Publication
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Thermal Sciences
Experimental and numerical investigations of heat transfer enhancement in shell and helically microtube heat exchanger using nanofluids
...Show More Authors

View Publication
Scopus (49)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Sun Apr 15 2018
Journal Name
Strojniški Vestnik - Journal Of Mechanical Engineering
Comparative Experimental and Numerical Investigation on Electrical Discharge Drilling of AISI 304 using Circular and Elliptical Electrodes
...Show More Authors

This work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Numerical and experimental investigation on the performance of the capillary tube using R-134a and R-600a
...Show More Authors

In this paper, isobutane (R-600a) is used as a suitable substitute for (R-134a) when changing the length of capillary tube. And the experimental data on capillary tube are obtained under different conditions such as (subcooling and ambient temperatures) on domestic refrigerator (9ft3 size), this data shows that (R-600a) a suitable substitute for (R134a) .The test presented a model for a steady state, two-phase flow in capillary tube for vapour compression system .The numerical model depends on conservation equations (mass, energy and momentum) as wall as the equation of state for refrigerant. The solution methodology was implemented by using finite difference techniques. The system results indicate that it is possible to change the refri

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Characterization of Zinc oxide Nanostructures prepared by hydrothermal method with Antibacterial property
...Show More Authors

        In this study, Zinc oxide nanostructures were synthesized via a hydrothermal method by using zinc nitrate hexahydrate and sodium hydroxide as a precursor. Three different annealing temperatures were used to study their effect on ZnO NSs properties. The synthesized nanostructure was characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), Atomic force microscope (AFM), and Fourier Transform Infrared Spectroscopy (FTIR). Their optical properties were studied by using UV -visible spectroscopy. The XRD analysis confirms that all ZnO nanostructures have the hexagonal wurtzite structure with average crystallite size within the range of (30.59 - 34

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Describing Polymers Synthesized from Reducing Sugars and Ammonia Employing FTIR Spectroscopy
...Show More Authors

          Melanoidins can be diagnosed using the Fourier transform infrared (FTIR) technique. UV/Vis is an effective tool for both qualitative and quantitative analysis of chemical components in melanoidin polymers. The structural and vibrational features of melanoidin synthesized from D-glucose and D-fructose are identical, according to FTIR spectra, with the only difference being the intensity of bands.  Using FTIR spectra, the skeleton of melanoidin is divided into seven major regions. The existence of the C=C, C=N, and C=O groups in all melanoidins formed from fructose and glucose with ammonia is confirmed by the areas ranging from 1600 to 1690 cm-1, and the band is largely evident as a broad shoulder. Both melan

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Aug 30 2022
Journal Name
Research Journal Of Pharmacy And Technology
Correlation of Angiotensin-converting enzyme inhibitors and angiotensin II receptor blockers with serum GDF-15 in a group of hypertensive Iraqi patients
...Show More Authors

The Growth Differentiation Factor -15 (GDF-15) is a member of the transforming growth factor β superfamily. İt represents an example of the stress response cytokines. It's mostly found in cardiac myocytes, adipocytes, macrophages, endothelial cells, and vascular endothelial cells, whether they're generated normally or not. GDF-15 levels have increased and are associated with cardiovascular risk. Aim of the study: To investigate the correlation between angiotensin-converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARBs) with the level of plasma GDF-15 in a group of hypertensive patients. Materials and methods: A case-control study involved 90 individuals, 60 hypertensive patients (36 on ACE inhibitors and 24 on ARBs)

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More