Preferred Language
Articles
/
fxZjU4cBVTCNdQwC8kVz
Computational Method for Unsteady Motion of Two-Dimensional Airfoil
...Show More Authors

A numerical method is developed for calculation of the wake geometry and aerodynamic forces on two-dimensional airfoil under going an arbitrary unsteady motion in an inviscid incompressible flow (panel method). The method is applied to sudden change in airfoil incidence angle and airfoil oscillations at high reduced frequency. The effect of non-linear wake on the unsteady aerodynamic properties and oscillatory amplitude on wake rollup and aerodynamic forces has been studied. The results of the present method shows good accuracy as compared with flat plate and for unsteady motion with heaving and pitching oscillation the present method also shows good trend with the experimental results taken from published data. The method shows good results for a wide range of unsteady motion of a two-dimensional airfoil.

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Wiadomości Lekarskie
EVALUATION OF TWO CRYOPROTECTANTS USED IN A NEW HUMAN SPERM CRYOPRESERVATION TECHNIQUE
...Show More Authors

The aim: To examine the efficiency of different concentrations of Dimethyl sulfoxide (DMSO) and glycerol as a cytoprotectants in protection of human sperms during cryopres¬ervation in this technique. Materials and methods: Thirty oligozoospermic semen samples were used in this study. Samples diagnosed according to WHO 2010 criteria. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyte. Each semen sample divided into six equal parts, and diluted 1:1 with cryosolution contains 5%, 10%, 15% DMSO or glycerol and injected within the emptied follicles. After freezing and thawing, the semen mixture aspired outside the follicles and sperm concentr

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Baysian and NonBaysian Methods to Estimate the two parameters of Logistic Distribution
...Show More Authors

In this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Two New Records of Coelioxys Latreille, 1809 (Hymenoptera: Apoidea: Megachilidae) from Iraq
...Show More Authors
Abstract<p>Five <italic>Coelioxys</italic> Latreille, 1809 species previously recorded in Iraq; <italic>Coelioxys emargintus</italic> Förster, 1853 and <italic>Coelioxys brevis</italic> Eversmann, 1852 newly recorded species. A brief re-description of each is given, supported by photographs; as well as a provided for their global distribution.</p>
View Publication
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Two New Records of Cerceris Latreille, 1802 (Hymenoptera: Apoidea: Crabronidae) from Iraq
...Show More Authors
Abstract<p>In a survey of the crabronid fauna of Iraq during June to October 2022; 9species belonging to the genus <italic>Cerceris</italic> Latreille, 1802 were identified. Twospecies are new record of the fauna of Iraq: <italic>C. dorsalis</italic> Eversmann, 1849 and <italic>C. priesneri</italic> Mochi, 1939. Brief description, diagnostic characters, some collecting information, and photographs of each species are provided. As well provides a key to the species depending on many morphological features especially: propodeal enclosure, semicircular plate at base of second gastral sternites and free margin of clypeus. Moreover, this study observed that most collecte</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Two Types of Personality and Achievement Motivation among University Teaching Staff Members
...Show More Authors

    Research aimed to:1- Be acquainted to the two types of personality A,B with the members of the teaching staff of Anbar university 2- The level of the motivational achievement among the teaching staff  3- The level of motivational achievement  of the teaching staff  of( A,B). 4- Differences of the abstract implications of A,B type  5- The relationship between A and B and the motivational achievement.

  Research Tools: the researchers  followed  measure  A, B type of  Howard Glaser  1978,and   measure  of Achievement Motivation for Mansoorm1986.

   The Result showed: 1. A tendency of the t

... Show More
View Publication Preview PDF
Publication Date
Tue May 15 2018
Pre‐low noise amplifier (LNA) filtering linearisation method for low‐power ultra‐wideband complementary metal oxide semiconductor LNA
...Show More Authors

View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More