Preferred Language
Articles
/
j4a7N4YBIXToZYALD39U
Performance of a tubular machine driven by an external‐combustion free‐piston engine
...Show More Authors

Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
An investigation into the performance of counter rotating floating ring journal under different working conditions
...Show More Authors

The steady state performance of the counter rotating floating ring Journal bearing is analyzed with isothermal finite bearing theory. The effect of different parameters affecting the performance of the bearing (namely speed ratio, clearance ratio and radii ratio), have been investigated. The load carrying capacity of the bearing increasing with decreasing the radii ratio (R2/R1) of the ring and clearance ratio (c1/c2), in the other hand, the coefficient of friction increases with increasing the clearance and radii ratios, while decreases with incre4asing the bearing to journal speed ratio (γ). It is shown during this work that different operating conditions are greatly enhanced the performance

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Of Research In Social Sciences & Humanities. E-issn
CONCEPTS OF LITERATURE: COMPARATIVE LITERATURE BY HENRY GIFFORD (an Article REVIEW).
...Show More Authors

BOOK REVIEW

Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Effect of Steel Fibers on the Properties of Refractory Free Cement Concrete
...Show More Authors

Free cement refractory concrete is a type of refractory concrete with replacing alumina cement by bonding materials such as white kaolin, red kaolin and fumed silica. The free cement refractory concrete used in many applications like Petrochemicals, iron furnaces and cement production industries. The research clarifies the effect of steel fibers with two types crimped steel fibers and hooked steel
fibers with percentages 0.5%, 1% and 1.5% by volume from weight of bauxite aggregates. The additions of steel fibers with two types gave good properties in high temperatures where the specimens keep the dimension without failure and the properties made the best. the percentage of increasing for thermal conductivity was 44% for 1.5% crimped

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Dec 22 2023
Journal Name
Eastern-european Journal Of Enterprise Technologies
Evaluating the impact of structure parameters on the acoustic performance of an exhaust muffler with shells
...Show More Authors

Recently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Integration of internal audit and external audit and its impact on combating money laundering
...Show More Authors

Financial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.

The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
Archive Of Mechanical Engineering
Using the Lid-Driven Cavity Flow to Validate Moment-Based Boundary Conditions for the Lattice Boltzmann Equation
...Show More Authors
Abstract<p>The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.</p>
View Publication
Scopus (22)
Crossref (18)
Scopus Crossref
Publication Date
Mon Jun 10 2024
Journal Name
Iraqi Journal For Computer Science And Mathematics
Solving tri-criteria: total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem
...Show More Authors

The presented study investigated the scheduling regarding  jobs on a single machine. Each  job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness  which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions  is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Automatic Health Speech Prediction System Using Support Vector Machine
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref