Preferred Language
Articles
/
fBcJIJIBVTCNdQwCFZ4Y
The Dissipation of the Kinetic Energy for 2D Bounded Flow by Using Moment-Based Boundary Conditions with Burnett Order Stress for LBM
...Show More Authors

     In this article, the lattice Boltzmann method with two relaxation time  (TRT)  for the  D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where dissipation of the kinetic energy is found to be proportional to   in the first regime and it is   in the second part of the regime as expected. An excellent agreement with the benchmark data is observed.

Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Using the Abbreviated Version of Modification of Diet in Renal Disease Formula as A Primary Estimate for the Prevalence of Undiagnosed Chronic Kidney Disease in Patients with Acute Stroke
...Show More Authors

Introduction: The association between acute stroke and
renal function is well known. The aim of this study is to
know which group of patients with acute stroke is more
likely to have undiagnosed Chronic Kidney Disease and
which risk factors are more likely to be associated with.
Methods:We studied 77 patients who were diagnosed to
have an acute stroke.Patients were selected between
April2011andJune 2011 using the " 4-variable
Modification of
Diet in Renal Disease Formula " which estimates
Glomerular Filtration Rate using four variables :serum
creatinine ,age ,race and gender.
Results :The study included 38 male and 39 females
patients ,aged (35-95) years. Glomerular Filtration Rate in
patients wi

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Kinetic diversity and its effectiveness in the formal variables of industrial product design
...Show More Authors

The formal diversity in designs is achieved by creating shapes and lines with a distinct movement pattern, which are preceded by mental processes. The greatest source of diversity in design in general and industrial design in particular is the creation of multiple directions for the completion of designs and the diversification of intellectual proposals for the design idea. The human activity that takes place around us in various fields of life takes place due to the diversity of movement in the form of the design product and its effectiveness through the dynamic diversity in the form, which differs in the methods of designing and showing it. He invents material value as a distinct artistic product that he owns A specific form or system

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 02 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Using WO3/AlPO4 as a solid catalyst for the transesterification of waste edible oils
...Show More Authors

AlPO4 catalysts supported with WO3 were prepared by impregnating the catalysts with ammonium metatungstate. The catalysts were checked by X-ray Diffraction (XRD), AFM, and SEM; also, the catalysts analysis was done by X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the pore volume and surface area of the catalyst. The prepared catalyst has a surface area of 185.83 m2/g, pore volume of 0.645 cm3/g at a calcination temperature of 500°C for 3 hrs, and particle size of AlPO4 with an average of 35.36 nm. Transesterification of edible oil using WO3/AlPO4 was performed, it was observed that WO3/AlPO4 catalysts give high conversion of edible oil, and this is attributed to the high surface area, smaller particle size, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology & Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat May 09 2015
Journal Name
International Journal Of Innovations In Scientific Engineering
USING ARTIFICIAL NEURAL NETWORK TECHNIQUE FOR THE ESTIMATION OF CD CONCENTRATION IN CONTAMINATED SOILS
...Show More Authors

The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting

... Show More
View Publication
Publication Date
Sun Oct 19 2025
Journal Name
Lecture Notes In Networks And Systems
The Effect of Skill and Physical Exercises Using Smart Virtual Reality for Volleyball Players
...Show More Authors

View Publication
Scopus Crossref