Preferred Language
Articles
/
jcoeduw-1314
Alternatives Scenarios for Transportation During The Morning and Evening Peaks (The Entrances of The Jadiriya Complex Study Case) "A Planning Vision"
...Show More Authors

The research aims to develop alternatives to transportation at the entrance to the Educational City (University of Baghdad) during the morning and evening peaks, which result from of the traffic congestion at the entrances to the educational city (the University of Baghdad), and affects the emotional, functional, and social performance of the whole city, and leads to hotbeds of confluence and congestion at the entrances in the morning and evening peaks. This movement was measured on the ground for pedestrians and vehicles. Some criteria were adopted to determine the density of road length to the area and density of roads for the number of users and the rate of the area served by roads. The research reviews the experiences of some countries to solve the problem of overcrowding and the application of their standards and its applications to the problem of research to determine the correctness with the study case. The use of spatial data and the construction of a database through geographic information systems (GIS) software enables a spatial analysis to select temporary functional alternatives for these entrances to ensure easier and smoother traffic in the study area, as well as proposals for some theoretical alternatives. One of the most important findings of the research that the Education City needs additional double functional entrances and exits.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 04 2016
Journal Name
International Journal Of Renewable Energy Development
The Temperature Profile for The Innovative Design of the Perforated Fin
...Show More Authors

The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analyzing current and future direction of non-oil primary balance: Case Study of Iraq Using Exponential Smoothing model
...Show More Authors

In recent years, non-oil primary balance indicator has been given considerable financial important in rentier state. It highly depends on this indicator to afford a clear and proper picture of public finance situation in term of appropriate and sustainability in these countries, due to it excludes the effect of oil- rental from compound of financial accounts which provide sufficient information to economic policy makers of how economy is able to create potential added value and then changes by eliminating one sided shades of economy. In Iraq, since, 2004, the deficit in value of this indicator has increased, due to almost complete dependence on the revenues of the oil to finance the budget and the obvious decline of the non-oil s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The net effect of the nominal protection coefficients in the production of table eggs and poultry meat in Iraq For the period 1990- 2013.: The net effect of the nominal protection coefficients in the production of table eggs and poultry meat in Iraq For the period 1990- 2013.
...Show More Authors

The research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 13 2016
Journal Name
International Journal Of Mathematics Trends And Technology
Designed Algorithms for Compute the Tenser Product of Representation for the Special Linear Groups
...Show More Authors

The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Synthesis of Sn1-xMnxO2Nanoparticles and study of the structural and optical properties
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Meanings Mentioned in the Quran - objective study
...Show More Authors

Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Fraud under the fair value Exploratory Study
...Show More Authors

The research aim is to identify the concept of fair value and its measurement approaches, shed light on the concept of fraud and its forms, motives, as well as how to identify fraud under the fair value method.

I have been using the program package SSPS statistical in the calculation of the research variables, and the research sample was a group of university professors and auditors working in the federal board of Supreme Audit. 

 The researcher has reached some conclusions, the most important; the lack of conclusive evidence about management's intent in adopting the use of fair value raises several doubts about the credibility of the statements prepared in under the fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Loading and Activating a Carbon Surface and Applied for Congo Red Adsorption, Kinetic Study
...Show More Authors
Abstract<p>this paper contains preparation of Active carbon surface (AC) from pro so millet grain husks and Loading and activating by Iron oxide and hydrogen peroxide sequentially to obtain surface (ACIPE). The changes of previous processes on Active carbon surface were diagnosed by Fourier transform infrared spectroscopy (FTIR) and Scanning electron microscopy ( SEM ). These surfaces (AC and ACIPE ) were using as adsorbent for removing of congo red dye from aqueous solutions under certain conditions through batch system. More than one kinetic model was applied to congo red dye adsorption process and it was found that the most kinetic model applied to it is a model ( pseudo second order model). </p> ... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The shapes of adjacent structures for informing the stage show for children
...Show More Authors

This research talked about the importance of adjacent structures for informing the stage show for children. The researcher began from the importance of adjacent structures for informing the show to introduce the various and different proofs, on the level of creativity and artistic shape of the accomplishment over it’s shifts that contribute to formation the show and it's intellectual, artistic, technical and cognitive Marks that contribute in dynamism the interactive show and contact the idea that connect with the design and directional vision for the beauty and cognitive. Lead to the eager operation in attention, sensitive and attractive the child. The research consist of four chapters: The first chapter include methodological framewo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref