Preferred Language
Articles
/
bsj-7418
Small Horizontal Wind Turbine Design and Aerodynamic Analysis Using Q-Blade Software
...Show More Authors

Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables such as (chord length and torsion angle) affecting the performance of wind turbines were studied. Aileron (NACA4711) was selected for sixteen different sections of the blade with a length of (155 cm) both (power factor, torque coefficient, lift coefficient, drag coefficient, lift-to-drag coefficient ratio) where high-accuracy results were obtained and it was found that the best performance in which the turbine rotor can operate is when the(tip speed ratio) is equal to (7). In addition, a power factor was obtained (Cp = 0.4742), not exceeding the Betz limit (0.59%). It is good efficiency for a small wind turbine, and it turns out that the design of a small horizontal wind turbine with three blades is suitable for working in areas with low wind speed.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Experimental Investigation of Convection Heat Transfer Enhancement in Horizontal Channel Provided with Metal Foam Blocks
...Show More Authors

Convection heat transfer in a horizontal channel provided with metal foam blocks of two numbers of pores per unit of length (10 and 40 PPI) and partially heated at a constant heat flux is experimentally investigated with air as the working fluid. A series of experiments have been carried out under steady state condition. The experimental investigations cover the Reynolds number range from 638 to 2168, heat fluxes varied from 453 to 4462 W/m2, and Darcy number 1.77x10-5, 3.95x10-6. The measured data were collected and analyzed. Results show that the wall temperatures at each heated section are affected by the imposed heat flux variation, Darcy number, and Reynolds number variation. The var

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 09 2025
Journal Name
Resources
Enhancing Reservoir Modeling via the Black Oil Model for Horizontal Wells: South Rumaila Oilfield, Iraq
...Show More Authors

Horizontal wells have revolutionized hydrocarbon production by enhancing recovery efficiency and reducing environmental impact. This paper presents an enhanced Black Oil Model simulator, written in Visual Basic, for three-dimensional two-phase (oil and water) flow through porous media. Unlike most existing tools, this simulator is customized for horizontal well modeling and calibrated using extensive historical data from the South Rumaila Oilfield, Iraq. The simulator first achieves a strong match with historical pressure data (1954–2004) using vertical wells, with an average deviation of less than 5% from observed pressures, and is then applied to forecast the performance of hypothetical horizontal wells (2008–2011). The result

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Geology and Structure Analysis of Shaqlawa – Merawa Area, Northern Iraq Using Remote Sensing, GIS and Field Observations
...Show More Authors

This study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar

... Show More
View Publication
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Study and Analysis of Concentric Shell and Double Tube Heat Exchanger Using - Al 2 O 3 Nanofluid
...Show More Authors

    Heat exchanger is an important device in the industry for cooling or heating process. To increase the efficiency of heat exchanger, nanofluids are used to enhance the convective heat . transfer relative to the base fluid. - Al2O3/water nanofluid is used as cold stream in the shell and double concentric tube heat exchanger counter current to the hot stream basis oil. These nanoparticles were of particle size of 40 nm and it was mixed with a base fluid (water) at volume
concentrations of 0.002% and 0.004%. The results showed that each of Nusselt number and overall heat transfer coefficient increased as nanofluid concentrations increased. The pressure drop of nanofluid increased slightly than the base fluid because

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (17)
Crossref (9)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref