Preferred Language
Articles
/
ijs-6634
Numerical Study of Compressible and Weak Compressible Flows in Channel Based on Artificial Compressibility Method and Fully Artificial Compressibility Method
...Show More Authors

      In this article, a numerical study of compressible and weak compressible Newtonian flows is achieved for a time marching, Galerkin algorithm. A comparison between two numerical techniques for such flows, namely the artificial compressibility method (AC–method) and the fully artificial compressibility method (FAC–method) is performed. In the first artificial compressibility parameter (  is added to the continuity equation, while this parameter is added to both continuity and momentum equations in the second technique. This strategy is implemented to treat the governing equations of Newtonian flow in cylindrical coordinates (axisymmetric). Particularly, this study concerns with the effect of the artificial compressibility parameters on the convergence level of solutions components. To confirm the analysis of these approaches, Poiseuille flow along a circular channel under an isothermal state is used as a simple test problem. The results show that when the AC-method is used there is a significant reduction in the level of time convergence of pressure and axial velocity compared to that with FAC-method. Here, for compressible flow the Tail model of state is employed to relate the pressure to density. In this context, the effect of Tail parameters and Reynolds number on the time convergence of solution components is also investigated in the present study. The results indicate a significant reduction in the time-stepping convergence as increasing in the {B,m}-value. In contrast, more difficulties are faced in the convergence when the level of the Reynolds number is increasing.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
International Journal Of Scientific Research In Knowledge
Monitoring of the Compressibility Characteristics of Asphalt Stabilized Subgrade
...Show More Authors

The subgrade soil is the foundation plate form of the roadway; it should sustain its structural characteristics throughout the design life of the roadway with minimal requirements for maintenance. When Gypseous soil is implemented in the construction of subgrade, problems regarding collapsibility and poor structural capacity usually occur when the subgrade came in touch with excess water. Asphalt stabilization could furnish a proper solution to such problems. In this investigation, an attempt has been made to monitor the variations in compressibility characteristics of asphalt stabilized subgrade soil subjected to 30 cycles of (freezing-thawing) and (heating-cooling). Data have been observed after each 10 cycles, and compared with that of r

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
New Correlation for Predicting Undersaturated Oil Compressibility for Mishrif Reservoir in the Southern Iraqi Oil Fields
...Show More Authors

Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an esti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Tue Jul 17 2018
Journal Name
International Journal Of Adaptive Control And Signal Processing
Single channel informed signal separation using artificial-stereophonic mixtures and exemplar-guided matrix factor deconvolution
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Hydrogen Energy
Determination of best possible correlation for gas compressibility factor to accurately predict the initial gas reserves in gas-hydrocarbon reservoirs
...Show More Authors

Gas compressibility factor or z-factor plays an important role in many engineering applications related to oil and gas exploration and production, such as gas production, gas metering, pipeline design, estimation of gas initially in place (GIIP), and ultimate recovery (UR) of gas from a reservoir. There are many z-factor correlations which are either derived from Equation of State or empirically based on certain observation through regression analysis. However, the results of the z-factor obtained from different correlations have high level of variance for the same gas sample under the same pressure and temperature. It is quite challenging to determine the most accurate correlation which provides accurate estimate for a range of pressures,

... Show More
View Publication
Scopus (28)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Improve The Fully Convolutional Network Accuracy by Levelset and The Deep Prior Method
...Show More Authors

     Deep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF