Preferred Language
Articles
/
joe-1460
CFD Simulation Model of Salt Wedge Propagation
...Show More Authors

This study aims to numerically simulate the flow of the salt wedge by using computational fluid dynamics, CFD. The accuracy of the numerical simulation model was assessed against published laboratory data. Twelve CFD model runs were conducted under the same laboratory conditions. The results showed that the propagation of the salt wedge is inversely proportional to the applied freshwater discharge and the bed slope of the flume.  The maximum propagation is obtained at the lowest discharge value and the minimum slope of the flume. The comparison between the published laboratory results and numerical simulation shows a good agreement. The range of the relative error varies between 0 and 16% with an average of 2% and a root mean square error of 0.18. Accordingly, the CFD software is quite valid to simulate the propagation of the salt wedge. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Style ''Affirmative say'' in the holy Quran Ibn Ashour's interpretation is a model
...Show More Authors

Abstract

This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style:  ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.

Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Apr 20 2011
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Chaos in a harvested prey-predator model with infectious disease in the prey
...Show More Authors

A harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 31 2021
Journal Name
Electronics
Adaptive Robust Controller Design-Based RBF Neural Network for Aerial Robot Arm Model
...Show More Authors

Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A

... Show More
View Publication
Scopus (42)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Wed Dec 31 2025
Journal Name
Wasit Journal Of Sports Sciences
The impact of the Needham model on learning the skills of dribbling and handling in football for students
...Show More Authors

View Publication
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Institutional Reality Construction: Principles of its Construction and Functions of Language in its Production; Diplomacy as a Model
...Show More Authors

This study aims to answer a significant problem of social sciences and philosophy: How do we construct an institutional reality such as diplomacy with an objective recognizable existence? The study assumes that the ability to build institutional reality is based on our biological capacity, as it takes different forms in all the institutions we construct. The study takes the theory of the American philosopher John Searle as an approach to examining the assumption. The study sums up important findings; cultures, although they share the biological capacity on which they produce institutional realities, differ in the form of the value standards on which the institutional realities are based. The study recommends the need of Arab social resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Manufacturing the Functions and Responsibilities of the Press Photo: The Photo of the Child Elian as a Model
...Show More Authors

The theory of the psychologist’s Piaget states that man passes through four stages; other says that mankind passes through five. At each stage, human learn new characteristics, values, skills, and cultures from different environment that differ from one society to another. Therefore, the cultures of societies vary according to the diversity of the environments. These environments also vary depending on the circumstances surrounding them, e.g., in war environment, the individual learns what he does not learn from living in safe environment. As the environment changes, the communicative message also changes. This message is subject to person, groups, organizations and parties and directed to a diverse audience in its orientations and bel

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Advanced Study of Promoted Pt /SAPO-11 Catalyst for Hydroisomerization of the n-Decane Model and Lube Oil
...Show More Authors

SAPO-11 is synthesized from silicoaluminophosphate in the presence of di-n-propylamine as a template. The results show that the sample obtained has good crystallinity, 396m2/g BET surface area, and 0.35 cm3/g pore volume. The hydroisomerization activity of (0.25)Pt (1)Zr (0.5)W/SAPO-11 catalyst was determined using n-decane and base oil. All hydroisomerization experiments of n-decane were achieved at a fixed bed plug flow reactor at a temperature range of 200-275°C and  LHSV 0.5-2h-1.  The results show that the n-decane conversion increases with increasing temperature and decreasing LHSV, the maximum conversion of 66.7 % was achieved at temperature 275°C and LHSV of 0.5 h-1. Meanwhile, the same catalyst was used to improve base oil spec

... Show More
Crossref (1)
Crossref