Preferred Language
Articles
/
joe-1606
Numerical Study of Thermal Conductivity Effect on The Performance of Thermal Energy Storage
...Show More Authors

In this study, the effect of the thermal conductivity of phase change material (PCM) on the performance of thermal energy storage has been analyzed numerically. A horizontal concentric shell-and-tube latent heat thermal energy storage system (LHTESS) has been performed during the solidification process. Two types of paraffin wax with different melting temperatures and thermal conductivity were used as a PCM on the shell side, case1=0.265W/m.K and case2=0.311 W/m.K. Water has been used as heat transfer fluid (HTF) flow through in tube side. Ansys fluent has been used to analyze the model by taking into account phase change by the enthalpy method used to deal with phase transition. The numerical simulation assumptions were three-dimensional, transient, and laminar flow was used. The result for the PCMs of performance, temperature distribution, and liquid fraction during the discharge process were compared to each other. Furthermore, the Nusselt number was analyzed. The result showed that the increase in thermal conductivity of PCM reduces the time of the solidification process by 20%. The performance of LHTESS for case 2 is 63.2%, whereas for case1 is 54.6%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Frustration degree and guilt among drug addicts harmful to themselves
...Show More Authors

This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug,  and to know the addicts perspective  who are in treatment clinics and rehabilitation centers  in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for  this  study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers  in Palestine and analyze their  responses  in light of some of the variables.

The study results showed that drug addicts who ar

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
China's Soft Power and Diplomacy towards Middle East Region after 2011
...Show More Authors

The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
College Of Islamic Sciences
جدلية جدليّة العقل والنّقل وعلاقتهما بالاستدلال مسائل الاعتقاد بين مدرستي أهل الحديث والأشاعرة: - عرض ومناقشة
...Show More Authors

This research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect  and Revelation and the nature of their relationship, in two core points:

The first point: Could there be a real conflict between Intellect  and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect  is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.

The second point: For whom is the priority, for the Intellect  or th

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 16 2018
Journal Name
Al-mustansiriya Journal Of Arts
Difficulties Faced by Iraqi EFL Learners in Translating English Barnyard Verbs
...Show More Authors

Translation is a vital process that needs much more understanding and mutual background knowledge on the part of ESL or EFL learners in terms of grammar , meaning and context of both the SL and TL . Thus , the main aim of the current research paper is to identify and figure out the techniques used by ESL or EFL learners when translating English barnyard verbs into Arabic . The main problem of this study is attributed to the fact that ESL or EFL learners may not be able to identify and understand the connotative meaning of barnyard verbs since these verbs are onomatopoeic (i.e,) a word that phonetically imitates, or suggests the source of sound that it describes. Therefore they may be unable to translate these verbs appropriately and accura

... Show More
Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Hexapod Robot Static Stability Enhancement using Genetic Algorithm
...Show More Authors

Abstract

Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Euphrates Journal Of Agricultural Science
A field compare five horticulture machines when used normal and super Iraqi fuel
...Show More Authors

A field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82

... Show More
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Bacterial Infections Associated with Cutaneous Leishmaniasis
...Show More Authors

Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref