Preferred Language
Articles
/
joe-1267
Numerical Study for HAWT Wake shape with different Angles of Attack
...Show More Authors

Increasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wake behind single HAWT was inversely proportional with α value. Highest turbulence intensity level was in small values of α =4.8֯ and 9.5֯, which explain presence of meandering phenomenon in these two cases on contrast of α=19֯, while symmetry in wake shape was more obvious in α=19֯ than other cases due to the moderate turbulence intensity which was found in this case, which indicates that lowest aerodynamics loads on rotor components was in α=19˚. So best distribution for turbines in farm could be achieved at use high values of α in comparison to low values.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Employing Ridge Regression Procedure to Remedy the Multicollinearity Problem
...Show More Authors

   In this paper we introduce many different Methods of ridge regression to solve multicollinearity problem in linear regression model. These Methods include two types of ordinary ridge regression (ORR1), (ORR2) according to the choice of ridge parameter as well as generalized ridge regression (GRR). These methods were applied on a dataset suffers from a high degree of multicollinearity, then according to the criterion of mean square error (MSE) and coefficient of determination (R2) it was found that (GRR) method performs better than the other two methods.
 

View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
The Link between Serum Omentin Level and Insulin Resistance Biomarkers, Lipid Profile, and Atherogenic Indices in Iraqi Obese Patients.
...Show More Authors

Omentin (or intelectin) is a main visceral fat secretory adipokine.  There is a growing interest to link omentin, obesity and co-morbidity factors. The aim of the present study is to evaluate serum omentin and its association to insulin resistance biomarkers, lipid profile and atherogenic indies. This cross – sectional study was conducted in Obesity Research and Therapy Unit-Alkindy College of Medicine by recruiting (115) individuals; 49 males /66 females. Subjects between (20 to 60) years of age were selected and classified into two groups according to their Body mass index (BMI). Group1 involved healthy lean volunteers (25 male/ 36 female; BMI 18.5 - 24.9). Group2 involved obese subjects; (24 male / 36 female with BMI ≥ 30). The s

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
OUTDATED VOCABULARY in A. I. HERZEN's NOVEL " who is to BLAME?": УСТАРЕВШАЯ ЛЕКСИКА В РОМАНЕ А. И. ГЕРЦЕНА «КТО ВИНОВАТ?»
...Show More Authors

The article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Basrah Journal Of Science
Nearly Maximal Submodules
...Show More Authors

Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Electron Contribution to Stopping Power in Burning Plasma
...Show More Authors

The dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r

... Show More
Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
Autonomous state security
...Show More Authors

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Nearly Primary-2-Absorbing Submodules and other Related Concepts
...Show More Authors

Our aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule  of an -module  is called nearly primary-2-absorbing submodule if whenever , for , , ,  implies that either  or  or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.

View Publication Preview PDF
Crossref